# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a85861a390538077bff7c5df631e18895b6831e7a7ca8296245f53634b9cdf3b
Pseudo Output
7abbd8bfcf28f956703c31df6e069d49b868b84d1019e1398576c0e0ac964f20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f6af817fbdc1347ddeaf9fef4efa6c2632a1438d82a7fd204170b8916c97ee23
Commitment
2e80fbbd37368e765d0513813689973d1ca049ae77751cb305081fb7ebf69109
Range Proof
672 bytes (Bulletproof)
Memo
35d3131eeb7892e5a112094d93ebc94861a30ba6e6131f3198bc3ec30ae62fe237931a8f8dd6cc16c6f45dfbe1bc039f3e216679cfe8c558b4d51642a0eaf49ea68e4cb313d6d80838212031dedf0cb12374dd61ab0e0ec0c424eb412dfe3d6a379b6bb045ea8c2834b9a3c8dcbb925e8e8a952ffc6993de63741b42a4239792 (encrypted)
Stealth Address
2469e0db36936487a3fa058d932eb7e8d9c0e8c9a2db46f344db9930076c8107
Commitment
e87936d5ec4ae03856bd27312dc00ec4f4979d2156367322b3a9a57f7bbbe625
Range Proof
672 bytes (Bulletproof)
Memo
c14603d684ab240ab5acdada00efac740770a75353fa48d7a4ba272fa1117968c19045c376c593929a7d153c9d6ebca72dc4a1c3b9de9376199bcef90c8c17e541af05f805ca6ad309a9ad57d5a1518d0caed54ae69b87389dd92feb1f46fe39d438c3f09385c9b7a1b7e74bc1755375b90ba97aa5bff0ddb1f8944bd8bf0642 (encrypted)
Stealth Address
e4e650d91013a168e93a193c5667c3ac27d662b1b5a4204b16219b74d6b84d62
Commitment
e82a6331b686397ad48b63a6b765f98597f5a597a3b1fdae19a41f57826bc13f
Range Proof
672 bytes (Bulletproof)
Memo
872caef84f6a067fb41160f3d63da1e3a88760bb04220b1148956dc57cc81d06477b869ddc8d913de37d5ca62c93e8dec42813ef1655b785b4f666f5e94deef7aa719d0f25974a4c7e442539fe434553cfbb1ba69a5ac7d0a8ef7bdefc8ddae624429e6517f824066d773d79399e55af556038a0809b698f24fc65499e241e7b (encrypted)