# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5e78f3ec5a9a00fc4ddb4f6e2c95b53c6a92d062b19b54549dcfe32c8bbf8117
Pseudo Output
0866d10c64db5f1a74584a06dce62675eadcb7bdbfc5ea330a0231efe185867e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
feff6bb8a2df192a9c6affab286d3045940601d4914661e727490354226a9d43
Commitment
4895cfccdc40c22e59a9a593c39e01d9fe41e49de6bd9fd22c83ceb1aa31ea51
Range Proof
672 bytes (Bulletproof)
Memo
d8c4a69c59f8f66d93640d46d18e0750b5a4fb0fc2f495745cee565258408843787e28a9297ec3b0fc643faf612de4badeffc7cc2d4323e1e6a6a9f9fcb6f77b7a09b106cd16b089a4032b7618adcc4ea3e15a1809ec45407353abc89dd32e67adaf0f539a4e3d78f6991e5a5d9b35d7104414a31b188abf59fe4688812aaa21 (encrypted)
Stealth Address
c276ef45f3ddbecf804bd39a639f8ed3ea402332c32741a85bbca2c4e6454c69
Commitment
0aa7312d60b5924f69f4eae08517de642014529925db78c0c330c310c7f5d63a
Range Proof
672 bytes (Bulletproof)
Memo
25941aa63456e18f61ea0f166baaa92ac6c72075e94dc9411feb22153976a9e1aed93d14a537132ee084c9b230acb9ac2619f2e08ac9c2c974b16b0bdd4ff5ee781c00f01cc0c14407901154b1ab336e07e2274c18310724d940a5f823f520a1eb3c6dcd01895bf32cdcc2446c322246385246929ab7c2c6f420046e7edd54e2 (encrypted)
Stealth Address
0ed0fd3a9637409d7c7663ea160abc5c63e99e02c3acf373530f95296f224215
Commitment
2c08c48d1503632c797a5b0f8cdaf546f903ca30cd183c2749e8f0575d82c10f
Range Proof
672 bytes (Bulletproof)
Memo
f20d34bae92504a8b05417a760ecc4984575c0f38faf0118768b81a4b7cd82d33f010a806ad3216bc096b6ec16587454b10df426f6082d40807b826496016147bda42a9a8aa7356c9987c6abbb397577c2b88012ece34adad911090d8ad89031577ab02d987cff2ca145aa46842ce99672bd621b34ee6d745146a942cad4171b (encrypted)