# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
94755d3788baf7df7cb2380ba5a8fc8936388bd1882d6cee34df5671f6337a3d
Pseudo Output
122a865f6232a3d7e60d1215d5ebfa81515fee8db0139facb10fdf7361183c23
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54c893b31931519c4a58c005d0cf2355534859f7790993ec8f11510e0115e348
Commitment
6e4b9e7c6ebc33530f7e2c658c89152f6e520e74f0fc2d042bc211b348e5234e
Range Proof
672 bytes (Bulletproof)
Memo
ed2787ec7d0dac1649b0fe943d90f9f743cbb4ef4b29c010ebb4b63d95e99936a6052b206c1beaae108cdf40e595f08491844ddd6fc61e6a983f9b4e97813f6bfcd8448456bb0faaa0b84992ca355ec3fb58acd4cc4a348d14e64be214f99a62f5f54ec5db069f7031cfa7e31c43e08b37455620c44c132478c7908421f5e997 (encrypted)
Stealth Address
a80a3e96c0fdc77dea8824b8ca8040a3ec4fc682120eb33e8ac0306d01aa082c
Commitment
043db5a04c36dfc5c72a5615edc02b065a23b374b65908bc12b6caf57e3c333c
Range Proof
672 bytes (Bulletproof)
Memo
e57b00bed40266014c0fb88a2cefdc22fef82b9fc3b85a993504e977b7a81d334b2a65292221580a22971da4872e1b4d5cee71723341552a7a8c8228a3694a7080949eaced91ee6d50773b4b131506948cf6c16da9c53e70c91b2f9ba9820a0220168ebad2a7db1b7735bf9b999aa6cbdf43f72ea476b5660c4e4f280975d558 (encrypted)
Stealth Address
707c25ad5d4df3c3ba2acd83b46f39ef2c9f920371bef5eca2047b95cdc3ee59
Commitment
e8bf5385c94c3319d53b701e674356a610bcf2b2d7e1dd66eda20a09fb8a2b5b
Range Proof
672 bytes (Bulletproof)
Memo
42787fd5ad7efe0162cc63a95ee826c8c95cec19f2bd672dca68c7d63b1e740f6efeb98839342e29f93c3efc41ceee9920d35a64bb413928e20ecb3c769ada4364e1ffc4826c389ab46e975d1c099e4811a6f6346fb694e8c582409b4292a585fcbd3e2072ddaacb87efeb6c5c52a6893da1cdf8b99601732ea4b561f7df4eef (encrypted)