# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0ab66c2f7b62685494e6732732a3cf1bedd9ec6c90fbcdf59df77ac0ac86204c
Pseudo Output
feea4313b31c85fb816fe508ab3c6819cd31147d621accb06eebf2ff5950bb7c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a2f2bea06e7b0e9d4dfe117c186d94c5d4556cc677ff2e4b1225d5ae5b01375
Commitment
ae7b33ea3e043c276078533d35f7b2493f2f8874cd4abbce7058a5e896a4b908
Range Proof
672 bytes (Bulletproof)
Memo
854c21e6915dbce67305574939030f7963c97fec1f1ac1a4acf50094dd56a3d305e07d95a4567250ebcc7964acae48d5f69b03e1bc1942c753190c77652a546a6ea040edc43ba88897a671af991f9e3ca405f85a2d50ddbc6317f3695bce428e2d23246d189b3346255ee15bb62dcde7861c54ea83e81e8ec025f77f60df6fcf (encrypted)
Stealth Address
866500daae87f7566b5713bafa8fe12d6faa5c36db783448a4d622a7e81cb86f
Commitment
6447790b8d6880f4eaea3a56e59f3b0502bd93c2ee92de2b2c427c3886cd7d42
Range Proof
672 bytes (Bulletproof)
Memo
7cdeb26b9cdba27cffd72a7f9a96451a8a770fa6e88d4d1e1367ace460aeb4529a166c697be7fcd76fcc41bd827700ed5962ec30ec5c8db96c255523d971b29f189f4694d9fa027ae84cd7f546418dfe7fec6c674e0681916d4181b6dbb3628cde13ce68220af6ed9042217b10c83307212642c22b71c15ec07c5a1298e7628f (encrypted)
Stealth Address
5482485f71bc56f756440df2669dedd2e1d97fd00034627d4fc4e823d16bed55
Commitment
70205b2e7412b8b8444efba17b0c9c97443f9cb8e4d702d4e56d2193502a8a32
Range Proof
672 bytes (Bulletproof)
Memo
8b551c440d5bde9225b5ed08d28b34ae5d140a0b8e641f22463a77faffcba67379ada3718c26fa05af0d0c1ae620131da4aa25960d71c40e10069a559a0b9e75ab6bb3b648357410c196ded1b29ab5dd4f96f541259f1c8a0b5968704c7c8292a88470a494e56eca7662206c8fd72252f63a28e45215576b034ea6ecfd44f54c (encrypted)