# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6ca0ede03c6a8e84039a385add08861d22d46973770905c00e151dbc072fe661
Pseudo Output
caaf7ac93bbddb24226d6d1709100b589adf50f484eb7092f9e6518b6282110f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
16eee354c45d3a8ad80601ea236c0ec59d5bf31fdc9baa69beedc8172bb3df18
Commitment
a293333ce0747be7b88444c7c4e8826fdfe027e145e98a3d7effe9bc314fe34a
Range Proof
672 bytes (Bulletproof)
Memo
43b9207187ce799606aaafd57aedd98ae2f67ba9fb060e5ab6cc16e6635f72603fc6d0c509806601800b5ba08c6097c103f3e60da14d45d9f732c331bfefc38480d98f43299ec67b84a13c1badc5eb597411aab89e5b5840ca1e72289d7d8a1385acae040d4c6c9bea048ba910190846ee7f21e32a30fb2a59966228facec677 (encrypted)
Stealth Address
a62179c22e48f69fc376a4169f9bad376fa484b40abcab3c37bd1af06723e768
Commitment
94a43f652e2c9f09920494dbcab348f79bf4e9fb2b4e4fc5d9a8f6f58a19f602
Range Proof
672 bytes (Bulletproof)
Memo
f949aec8175cbf03d945a254c2299fdebbe809798981a504c0dffbe7330f527054e6da305086394dc878a38e0c9605ce21899d4470235d5a68a56949a295a435b78f31cc505cf23266382429b17acd98b73e5bfdd071cab6eede52958888f17b524d282ea247b367362b7770e352f26c24c508985fe60776e9aca6b98a69aca0 (encrypted)
Stealth Address
101dd96d940aaa06faa755f546ba6d18cf760c8f1c37ad0e676ca43fc27ab338
Commitment
78cc019b819749a1966a8dd186b455a9691b1fddfd936385f5253acb26ea4853
Range Proof
672 bytes (Bulletproof)
Memo
8f8cd79c32e1a4b445ad42cc8ce0af4cc7535d6442cf47da6ad31937e40b0dfff0c9c2674825560df280e6db1937c9eb8b250668833a32905b6052e92b92352d46a0db8290d9a1f8f98f6f96b86f89e7ad5e47f3daa5b16c71b75b36ad28075e0166214fa83ab25f11598b4c7fa968da45e4767e076452840dd088fe6bda10df (encrypted)