# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7602f993614e163005f59c45f411cee1c33fa32b8b5b778e386f2503280fdf48
Pseudo Output
007e430e8eeb92c133fc12fb176fa6a48af84b487ca3c8304c2f9279a77f3579
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f69f01c6986e44a96658133613c586c16466702d8c301d94e4cd056c2cc9e53e
Commitment
b20e5ef12e6b437d47f71f31cbb57d70b90e21e343d8382eb35293649eccb903
Range Proof
672 bytes (Bulletproof)
Memo
a7ab9e2ec68adcfc8b963f53c5e52c7d760dfbdc5c26cc7f75dd045a3c9e1c7b24a03a0ab2afa488196efe6c666091e24da809459d1b4db3337cc38f28b3e23781762bbf98d0250675d6a0f37431209355c85da523cdd3b32705cb8cb27e3c48dc823ff4bdddc84b9741d67637ecbd6c4f1e8c75cf763e325ce7d8b99891f9dd (encrypted)
Stealth Address
601f6e24cd6a5ff8025fca6a66fb255158a3403d2f36e4b34547f0b83484c833
Commitment
ea676c51a4ed34591a21cbd12fd6da5fa398b93536c0f6bdc5f6ddb071259506
Range Proof
672 bytes (Bulletproof)
Memo
da0dc25ae02c150e65d9a6ad70bb0c52569b94804504e1ebf86ed2b5ea41925382f48474f12e8cbc037ed52e3d90c205c05f5d64ecbaf1294b4a03119cdebc159f7f1180985bff99dab7c3e8ede902dceaa34311c83cd9805e14b9dae9223dfe438403c35379b77b0503bd23e8aa73b912db64e28078e08b404cda6a43571ae4 (encrypted)
Stealth Address
d85a7c88f8dfe9f18bad65fcf013f57146f5e5560319dae00759b5d50374030e
Commitment
08e621ac8e2ef6259fd2ca971b2d2f407b83082b08f12c1373832d67ff38b613
Range Proof
672 bytes (Bulletproof)
Memo
4856f99dcf12b483f55c3fe41cf2b7829a0cd0984444f171fc8a8e2a0cd66a79ada0efe15c42b63b9af56e995412e31c840f4fd84ec397cbca7d98f9b809eba745f326276944a2faeab7434cc6a64194ebb796891eb4f52dae2f410e0b270b8fe5acb72e5db3f31adcc845470dfabf58a8e52c135d8fdc9f9043b5936a806f5e (encrypted)