# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
de27072eece051983e9ac2850e4bbf4fdaf3cc0cd7a356a4a49fde08f70e361b
Pseudo Output
be7ce8638557984e431d17bb2aff115828d3a56ddeeac2a951dd6f7aa4be3736
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
90bc98f49f66a0bcbb3e79fa32155ccb7f738a72915aefbf0087c3dc391e4e28
Commitment
1af691c6d6479d3105384fa89c8c23d2d35566078bcff5fdd215d4dbffcbc84a
Range Proof
672 bytes (Bulletproof)
Memo
4e1c4f4aaca52e914a7d27638bd9da0e8842cc0c87db7d2e2a04d07f2f3b04b808ccada59326d42c53fed80a48eda54e3413a767f54a945aaab5cb50810b0a156a678c260f4f917a019ecc18887ca0a85ce4a20aefa99a4747597d26e11953dce22bcc6e2eabdef078632889e146a493d005c2b35a4b3f11ec15b8dde027b73f (encrypted)
Stealth Address
2465995ea6b4b9e10dd2b9ffb03e1655190a04a749012347f68cb5b980fe5d5d
Commitment
8c2adb883bafecd24a249cec235a75f8b435968f1026060a7931707ba5663e36
Range Proof
672 bytes (Bulletproof)
Memo
6d4b16bce24aa3e46fc95e627141458ac2befc773534e761044953b8c88c2989722b17f79e5b6c833b9281c7f27ee94f42f4b05d0ecefae17bfbb247a590f1fbd9050d9187b472c343d7b8f2182bef85cac9554555304fd4d017bd810d5e4b41fa0e65456136a9187a62b1fc47c2ee891acf7e37c2942c867193307ca0d2d97a (encrypted)
Stealth Address
acccc2cb68f06f2f70666a588508f98493530ebe177fb0ad5cd25a10f643db50
Commitment
20e1f8642342c74b5e16cd581182403e71c5f64c1a1032e065ad3256a983dd68
Range Proof
672 bytes (Bulletproof)
Memo
b8f3519cf709b7cf907405308258ec679ab775b4b881fbbec47e82dd77851d69845b1a74ae4c48f56052b0219b75fdf0c7ff8acb023f0c9fcc3c241f9687af5c3929077f8efe608d21adf6c4dc785db4aff010cfd0cba39c4ae271f2036549de44e6a78e3f92090b319542a6f59691014c59a6a159678e7688f19c5ef5ea4284 (encrypted)