# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f805b042a7998f0afe13b3b483980614d16e512c4600921189e62fb80c69da12
Pseudo Output
2ad99ff88a47b0e68721ca9f2a789d2ba95416b8e2cab926b89aecaff3173565
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5ced5c1013ebcd9e539fbb01cef62ca3d402f05e6799021c621ba9db4809f43a
Commitment
6a5d78d114ffefaf29a75ab0abfe3fdf5cb8ca8461b5b25f5f67f9e3f0fd070c
Range Proof
672 bytes (Bulletproof)
Memo
5cdf12f109c8a71d4c6eb35c7b94955a1fbba0461ffbb73651cabaa320fd301708c26572a15dbbc8bd675801818a5072690e9cc283ee9b28fe9a0874ce9bad882799578408bfd38192b7115bc6e0befdf951914cac4a34930ddc67d6566ceb3c04e45db39ae2f43748a2dc0c6f7c1eee0fc68ec2400b90558408f1f2e89c78dd (encrypted)
Stealth Address
72cc6d1286b235376beca3cc328e68edfdb51a83be9eb25ac4ca7251057b3932
Commitment
82e291345dfcf82f51609b3ea7aa69a98d52bdbdbe66bf1bd14d1dd315a1a404
Range Proof
672 bytes (Bulletproof)
Memo
217139c35f965f59c605b3339c07e3505631d2df19f4f76d3a19ebccf4dc58f900d7eae0bb518c7b86e833b0c4df17e4b258806922e38e75f69aa7c68a0202effb5c81e1b48c357229069f7df679b5660288f9b5629178e5bc50a359c69445c7d95275c30db1219feb4afa797252eb139606dd3c075d156dc7395567c1bdf5a5 (encrypted)
Stealth Address
68d62bd5c1f22ff58bae19fb0c0bc6112c1dbf044cea6b06a6f023db4daaa224
Commitment
0ebb753bb8b5aee55340fa0aac279b309bec506c69fde0d85dcf5bd5b6def36f
Range Proof
672 bytes (Bulletproof)
Memo
f3470c2ff6929db3fd67bcb255a172c21abd7e40adff5cc121219bcb5647e63db17fcb39d513d39a956126b39f1c8360234b162b1f32fdbbc74f994153adab5307542571142b24b66ae7892c1e3fbdc5a1794c3a9dd3a5d768f05c4a06749c9be1cb10cdce876974e1811c33747c3e34b1af89c7cd7483c20f969218a72c7a89 (encrypted)