# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
487cb4b668e89ec207361ef24cd29d27b1a8ffb0e7cac3d4ad1a64aa6b07db23
Pseudo Output
00309aacafdb01f673d5547911e11efb55aaa69aa22d04ca526380058ba4723b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
de60e87ce5304d82d6f95a5b3f0663a686c0cc389c7096d973b4cd8eb001d40b
Commitment
b87ddb4f51b7511794d8a12b3d443a2c7ca4bd8ac6c52b05e8d5aa6f8153e326
Range Proof
672 bytes (Bulletproof)
Memo
399f40c801473dd9d8db3837faab09ebc4d1c1b4d750def3cb40cb8169722ca65afad44996cc7b77e1a4797321eeb4694652f17c65c853a714613efbd0df78916b0260f8233bd1bad80d323be249707d591887d88996428bff03a7019cf1f39ac48510900f90034d60f59fb2a9d4bc83423c5f4454c1fff6b6e20929157343db (encrypted)
Stealth Address
4ad5c8ec13551b6f0bf60e34f9a8e0df4ce06e421ce5d42466ee5b9fe1526b4b
Commitment
96c5755a91f1d84d10987919d086ba3223a97755f264ba5f2b6c1940841e824d
Range Proof
672 bytes (Bulletproof)
Memo
56fdc5b56de543e5eaa388df43ba9016ccc05208e452aeceaf8e9d3cca06c6428ca99c489cde1b95c86794cb8339144182b92fd4d5fd3a880a9d8f472324b417532c59101ff77494d5c8de435befb52657adabc654fa8d4c62a41c9d14f167c342c83b1194665f5352ff3e6fb5087ae6644f004ece4b464490148d526ba41c36 (encrypted)
Stealth Address
22dbd18bfaf9a38ca9ce4b62e93d23e42f45cb08a6a6a388b2e8e92a32f80805
Commitment
2493e1830c1e6e6a83492441ae0efbe4b9eda00ff50c16d34c57f47d74ef9949
Range Proof
672 bytes (Bulletproof)
Memo
1bb87eeee997a897e9c79b07728479337d0adceb54d89c4ccd51f0269671ae1b6dbc7ebc910c3ca8b36557de7a0be0bb9f396e03275a9cdc8c32c4621a44a83fb95f873313b76cb1a967af71d850ccf5650100fa71362245ed52404c6ee0e378a064dbdc13d292ba07e09dcf415288754a034333df4500555ffa28b3c48efcb9 (encrypted)