# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a4686b706c77545e9ba004f950e951121b74e91f3f1eed5c779083f396ea7a01
Pseudo Output
e0c271ad8fcd712fdb93a349dee3402efc5d56d6cc814a0d007c9515207ae256
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
966584d135dd0150789bf5b776f3e9e26a465121b0430e85e3115b737ccef103
Commitment
1aa127eabeda0c5920f60431fda85fa4f31f3d659437c0b112b17ea696c5e868
Range Proof
672 bytes (Bulletproof)
Memo
9a29dd3f28030bf0c800e96f3e686f7e6a864a3f23dfed3ac4e932a8df1419c9a128c1f994ec50d93ebe4130fc094845b1375731d6c15f8a673b63fdba2a6bb35f10b104ae76ba3ab8ea496da8b786ef21dd5b4b786c5da2ce56a3afa922b3019333b1e6ec68dbafc8d385f78ce46b0bad6e98e8ee43a0436a2064a7572d5cb8 (encrypted)
Stealth Address
e60ef2aad39bc35833adc5404d3ae4d36d53fe9fad368bb1d44cd69f6b796a13
Commitment
c0515edd2b730216dcbe367d7207e7e7c3b30bba533e533fa94d7c87d5770d0a
Range Proof
672 bytes (Bulletproof)
Memo
3139d22487fdae66ed5ed506e8f93c7973af8209d5336486c67f0a0a601c5d20b034d28011f8f2eff5bc7fac3c85682e967770f6c38810c18b468216909891ef5afa39bb28d1167dc2b3518a772e7eeb20e0782677105c822e1056f326bffb791dbc1a8a4826c00b356fefbc628f5f002931d50e3a99c8a40960b08022895043 (encrypted)
Stealth Address
762c0f70a7d035ec8d635f32e500be2f3219547625701cd721187024778bab3a
Commitment
2cea5acd3dc761c97c52bfbde54deef3f1d18f328783f6893a8e00c3552f8f6e
Range Proof
672 bytes (Bulletproof)
Memo
19daba25e54659cfbc27f3003fe7bdff4aa54abc940495c419cb34102336bc32c5850bcb1a9dfb3eb9a2478e5508738bd5b695f470d489f1d7c7ac877e65a004f369924c5f0a45eb8dbae7afc0459a97940e7cee3b490047775b571e2ea9c0272645876464cd9dbfb31e79a99a18ad7a6e955194bc63484bd169f6d2a2cf1c1e (encrypted)