# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
54ef356ee965b26a5acddf316346e2419a001b4c5101369e74e882b7de734b6d
Pseudo Output
ec752b33f59f4815adf4cb9d1d76056be1bc1d47ae46884499935e21f32ef563
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1c091b384ba7b00a07eae8add5714d4dca95636cb7c0b99f3cbb390e2b9d9a1e
Commitment
00b79065549941fc7219fb271747afc14532942e50dfcab75799b4c96386d736
Range Proof
672 bytes (Bulletproof)
Memo
357440b2d1189fff376a275282650678cd20f6292c22b396c3d099f53d6bb2ddfe07cc2815228bbbb561a1ceaa2897a11aea63a60bf4773f37e26a0c72ffd36b0acd988a2506abf6851dee821591ac49a735d79941d278aa33968ec909759775e4bc44c45d1de4c55f72e0905a1f755c36f91aaf084a5386e6614c34ce7e1718 (encrypted)
Stealth Address
2a2f7d3d07da3220ff9b97c3ef84f53e03cb30f25cdf1801d73a3b79044b7a7d
Commitment
deeaa91ab95556aeb9cbe3baa6b6b9e34005c57eff8ddfd3f51a907575934526
Range Proof
672 bytes (Bulletproof)
Memo
e4d35d153b0a3a9a0296332e539da3d5d4685ce6a714b12396d8de467f00d974d6f1a441b51b5e3e7232ac5e2876074f3cf8ce55aa80aeab6130f0110db506e93e1f558ac11f7860b66dc5c22ff1d28b647696969a557dd2d1e0a9ac67c67a621d3cca1d3d1f8a6edbb4b3c379860cb0da29017650ffa7aad530c407a390ffe0 (encrypted)
Stealth Address
b0b101b771b11d5815537a7c7803bcfd4b5215ba4e022e51cc279ce8b3875921
Commitment
ae4d2e066fb1de2428651e63b11458658781c2b8fb5789afe08ce2d3bbbc0649
Range Proof
672 bytes (Bulletproof)
Memo
847d0204a0db2c6c5c28c3b379a9a4cffaae522d69e0c9b0850e72ca87437a4b85c0ff76262e273a9d2774c6e1a4dc4bb1c912dca4057719676abbbc3f8e951cf4da76015decf8620112aae4fd8ecac21d6090c8dbffc7146bd92160fbc5f3135c19c61da713426e9314ba3c214a7027d579ab774a3fb7bd1937c731b41121b7 (encrypted)