# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e277f4c61febdfc9df0c3fed2bb893a59e05e0d5cbea0a6c80a3f1fcc7f650d
Pseudo Output
f876939bd4a89f26dac89cfecb9a64f6c8fca22b651e4ae8d31bb619912c106e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1eeae5d4dbf6868c2887f7feb43fda7154a8e4eb5e7e92bd4847fd83e20a7b6c
Commitment
42c799c66867e68dfe25e313e420f69193809810e981430fafb8b285ea6a6b28
Range Proof
672 bytes (Bulletproof)
Memo
2f91b9b77ab9ebd67f3ba89a831a4b69faf9389ebf0ebd1f2d518c60aacd6e169dc65abd80823228358841b54b957156abf27c4b5ddb6338623acc431b927edab6302527c1c96edf9cb76a31158040bfd48c0e52328a0b0803e28df9aa4a2a7b86190b42fe5cc9d091464369a8a102224e5f0ee6396367876b0acfd9a9124d61 (encrypted)
Stealth Address
86d1f64e631083d67dffb0f4b286c53fceea61a187b05c9deaa6be5a8a492559
Commitment
a4fa4666941fcbd022dace2dc7cc795a0b19bea299199f49a1f565c7d0478d34
Range Proof
672 bytes (Bulletproof)
Memo
f174decfeb4175473dc2f98101b08bfb98ce99c96b2dc2d3e5226136b1f1ed6ab81842bc59c8b20d6f6087903190b68bf62c990589048556eaf1225adee963a5ff0c9f8b6e37d1f5fbb7764ac261aa0f5bf3188d504a652eb2970a8e3ff3c44eb7881199623eb887a227c63216aa6d276d9a3e1540d1e46654ebaab841cc867c (encrypted)
Stealth Address
8c729e9db49155d364cbef4981188e8eb4ec3106d9a3ed9b2a167f29633bfd03
Commitment
ea7308553118de76067df082be3de44c0bd091173798f97a3d5659257caec17d
Range Proof
672 bytes (Bulletproof)
Memo
504842991643be4f0c7a96b53160306d5169db009e925f81fca9bc31dbcdb3c83eadb53bde9a41abf102841840182cbc61a446aeb8b7bacfa36a0e28cc7aa9e641499c3bcaaf274de9f86f9e564d7aa391de848cb5bf73c1f89fe08b51bec1f3a032b7bb26fd65510f5085713978d8e08e6690300982233e50836e2fac754a8d (encrypted)