# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e0a85be80dd569df3bd0f9a8c3a1ab232ec8b86e31160f9bd52be39c54839a03
Pseudo Output
4eb5f8cc465eb983ad49d6c041a762f9abc2bb9f5805fcdb07accc079a511766
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b06d461dbafbe937f8fd5c3c5faaa50fd6251e6cf882996a1adb1e22cfe18356
Commitment
880495fd88e4908ea3ede853269f6075a705d776d2f68e7f00e11b5aa8c3436a
Range Proof
672 bytes (Bulletproof)
Memo
d9912071f748bf69e3e7246193ee9f7088b694f824f9ebcfb9ea81d6a960ee1fff9be9c00b9cf861c18ac425c50c593cd9ca632425951361e008ff51df046ae1b0bc92619d7076c29783b2cb4c4c9321ee25eaa80ee2193dac9188bc04dc06afc802361075c65cee016f117f1b90b89445c8632c624d5132105de0fd3b96474a (encrypted)
Stealth Address
78f3712fdea564a5f7771a1bb900d34eca73e63404e83c6dc42b5f31f2ab9614
Commitment
68bee37a246808693d0faf8fad3302a2b3aecfa5d85a603c64751d785b5cc725
Range Proof
672 bytes (Bulletproof)
Memo
b585ab092188f0f979aad12cfd97d0734d44f53a11345c2e6bd1b37f02bff71d16716427284f3d64bf0a07cf6677319f0988a4ab5d9ff10900a94164b13fd3b6061db9cfdc194d165e1b0bcadb24cbab0a8ab553439423aa1723722897868cbd9026f00b12feec1e9868232444ef132985099a38736de795c40931d58ff97467 (encrypted)
Stealth Address
68e166078eb4dea7ddbaa40c5e09593861f89ed7e1ade242b50e95b1e443e530
Commitment
02a2caf58f4567ff432c80450883ea6077a1bad4de879633cb22025965cce404
Range Proof
672 bytes (Bulletproof)
Memo
3a9d60efb6d8929ce28a39fb5845099811854b4a080d0c5a6186672588ced92d30747f46fe4f09f74f171e09e70910e1ffeeeaffa6753cf693ef94ac1070eae23e3bd61d4f350a629a75bccd62897328809ad2a32c18cb28912caa8b7437b3c1786e461de0a5e11329c83f3b21cc8bf8266c557d45e7986dcc8d4557595d033d (encrypted)