# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b8bc2017b72506ca030144bfd078dbfd8a206a14278fd620c3217fd75529c82e
Pseudo Output
c64b6fc7a1e9410a3eedebac4fe8c2540bd27b41ddefa76e57ffcc68de6e2e66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7eabdf34f4e0516314838dc31db14c33c086d5fbbef8e43f1c0ca4e658ba610e
Commitment
ec0b2421e6113ca18db8ded73bb66f2dcd8ff1b4284a5f8e3e61a437095a561e
Range Proof
672 bytes (Bulletproof)
Memo
271d1f480a4755e9d12e80258f83a10a8b2b7934f10c40f17c16390be84a0d2b4ef5d9a6c1bdb8b0d32017a97602dba54f5da2cf873ea0fbac1e9c831e1ddaf2f1a61648c3395f3f873cda8a7ebee78d037758baff6873d544266c4c1388234e3b1469d501ebe7b34603d5a881edf5349edeaa6aea7d9754cc8964508d56e871 (encrypted)
Stealth Address
d8dbad40e8e3a856c0b8b2ad4c26d4f606726e25ac01a81d002dbd3819ea0c27
Commitment
fad3346179f3c90ee133620e966066be79698287b8bc2727786f7d41a1c71d03
Range Proof
672 bytes (Bulletproof)
Memo
0c1792f0de7e1c6dc4c2fabe31adefbbace1ca42f9c5966eaaf505264b7547616741a0280e453bd39b0cc3d74b877cbc776c6f2e783d1a7577b227ad2e7094619a367a5e0f75ca996e41fd579da799d2079bb9161a21c81320cc2b412d7a9d4093a783965517e997365807b7238275f06a512347d304540f7c1996bd6483cff5 (encrypted)
Stealth Address
b2051234c2248c918c040a948189e9bcce3ef1872da78d8e5e4b23b921661213
Commitment
88d653719c988e34c5d970dc4251151f3545605c229ac6319e8eac7738b6fa00
Range Proof
672 bytes (Bulletproof)
Memo
5d65230e189e7e0d370dea827ef8840c38a166a01e6f174bb93feb19ae1700a06bc0202ce2ba42994137fe788d5753e9736e237e4deb2efe9d8e2cdb2b911e2759cdbc760a232d66073fbc5c9d4a99f509f92b0f98ff64cd8ab1d521406a151c7c3522233f22cbd6de82b3453cc23f898b4a6d9f5eee4ca94f0fe66ab583d679 (encrypted)