# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
68000d3bc037ef6d6d2e1506e458152e2a4f827d55e2deda39bc994d7255d14a
Pseudo Output
5a83bdc86573a6451ede56b4bfd780f6f4753ec89330f46d48fbe2cae10ded19
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
36cdd57d5bfc5481fe00623989a17422bff909cb893c05449dd1b8cbb3eeae7a
Commitment
be7f6ab97ec7ddf5abb77ca64759e94e6e8cb2bd97733314accc4c3503516866
Range Proof
672 bytes (Bulletproof)
Memo
31a5b4c2a48abd8263676a1eb50896896bc074c22b3b89c0cf3159cb0dfd955b8e6cd45009463ff81b39ebbcd9ce8c079c1e2c1488c487a94e72f60bee0d7e96e855f5f2abb9c4776106912d0dbdc2a1bbb2475ec16c4dcdbbbde3aba99c55eee5051957f12268b294b3ec3f5828d85fc034ff8dd69163de2b3f795bfe596d3e (encrypted)
Stealth Address
fefb5d16b4ce1ede2c75935d4bc1dcfa58337e79b9b20e5546cfdefeda397873
Commitment
e821c8735f7072b945fcbdd1e6fe79e5a943060de003239ce6631c500ba56b02
Range Proof
672 bytes (Bulletproof)
Memo
d6f6d6908e59cb7dec5fbe22394dae5696ddad7929fe588ea2c7fe757dc5c8ca58471e84abf561696fa0980dfb679430b9220459f9c1544432a62cacd13cedd0286e087a77f1e4fdb58932035b645b5c4c03db45ce8ee83b42e0b14daa9a028cef50f29a6e8a46147d83dfe961f6c4442f7b9fc54da478c96223aeacf563e1aa (encrypted)
Stealth Address
d668a1cc1da25186448dd9093576a4a5587cfde1ef9df291008cb7fd94ebf331
Commitment
94a5510978cd4416fc87672ea0e5a59b539d816abc9c01806c0bbf6b3dfbf03c
Range Proof
672 bytes (Bulletproof)
Memo
d9a4beb34b43b5a9908bc397aa84ec12e82955a1fbc64249bd3a325e7036de1084eac529a876dab53d69262477a97cd495a39b9f7e831aaeb072662770d7c0044fe836150234849bbdc2c7a02e68251b8242c2d95b3ad8f67c92d7b14a60df587ca2ad141cf19fdcf2325930b80c63491f4682ade5af94940242d8d6ef2418f8 (encrypted)