# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c4efe80a11a171f725232006a29574731a31c06350f7d8c05ef9e2110554505
Pseudo Output
e638d97dddaa21a078810e939e0143306193ab516d9313a5f3de4fc263d4572a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e08924f6d77f490f568ffa052a90f75b58797e8c9cba34136deb46a9ae2c156
Commitment
2a401f7c6737fbfb35a2e9853ad9c836692324790a7ac303376d7b9f2edb5f6f
Range Proof
672 bytes (Bulletproof)
Memo
b01391fcea2a8c2baab6a3047b28db4cfdce5737a4d0b53ed182c78961d1eb93fa6c2e40d07cb4bb25926b214eba78a61f683a41d7ce3463e3b7f2d78ec65adfcedb0d515e8f89d7f2ca9f4a510a7cee0a2d5576a394037183c0752dc2216f3a5fabb809cfbdbc7cb5a707959277d7b2728edc5a4a5625970eace84a0041758c (encrypted)
Stealth Address
ea48c55d233568b643a269258dd0e52cec1c662c0ac40d0346b725c6f6da8b66
Commitment
a26a572badd41b9f6af1558196fe5111e18ffd9efc3cce410d290ff80504b14f
Range Proof
672 bytes (Bulletproof)
Memo
b9e4a8a9a55826a446f4e0894d7f69f2e1bbc93af75aa723e9ebc46d54b280e6c3711180ea6c0a1c965f2799cc170992530074eb434f96c862a4e3e5cf3bcef8629ee5a3ce043c55141bf3fdf341b307498b158cc5ace1d2b562af31cd4393fd7979e42ac2d917208618d6e38b8799c453847f6a5b5bbfa831cbdf64dc881e97 (encrypted)
Stealth Address
e0c406699cd38274a43fc551faa56db436b3e20d6fd49a51e8255ddf1adc2015
Commitment
1a6a3e35548463fba510096bfa9d84a2b97d3ad02a7e76f300bd6dc2bd75eb78
Range Proof
672 bytes (Bulletproof)
Memo
0b5abbb790af3e20235840671edf8bd1cf395c4fbf2c2998ea29c62c85160575ef9582418a40e8dbf604e30267b7f3efd7d76f90887b112cda21a8c029fb25e6ced15f6ddc1d561a94205d53b32309ffbb68c859334ea7524c526f66b57f14ea4e2156a112266e68ec4ee3721954f9d7ce399cde868648fb85108db64b33a81c (encrypted)