# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a8edfb7514df42394d711f35df0539a127c356865051bcca7d6551e91883924
Pseudo Output
3c15de7ee8ee97bd6c455b7e2e666c9790c3ba4bd2714ad7d2ff4e0d1effd62a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6f194c2d8309a8b298060c0e74e5bf7d7d57e53eef1586cb204273dc3c4fb20
Commitment
80c1ef36b6ef2038d0c43a0259864968c99f5fd5cba6222aa970f5d657761702
Range Proof
672 bytes (Bulletproof)
Memo
740c9cd4dee6eb9464e86ca4d20f887497b8229217fa5c1beb63c2473ee1cdb45c3622d2eaccdad25aada6bef763c826555ae3792995a5ef4bfdbffa9b050efd68c9dd1e3c173b24639d0d6256caf65b44db755b81128fb5b2a4e8dd0206d94cab0d082c5a7fef5670d37a1779e20e85aeb6b072f529c9a7690a0464cf4c1c7a (encrypted)
Stealth Address
628d461f35c9c1536f1fe297eac8df0185e0202f3a0e380ad41f483c4c2d0721
Commitment
d661a956aff985ffebde4d086778c325252583bcb29b9a8d0c8b8e8276a75758
Range Proof
672 bytes (Bulletproof)
Memo
27fa5235cfc5ce329cc828aa65a4b725aad86990774a94e1df3edb9215dbc191f1b6a3d8df1148fae74ba33d2ff38d46491791ce434dd39b8ab548ecc69a9e53b13c62f1cdffdc6880f215efacd4d069449c8e3df7fa614bcc46be7a21390f8e1d34ab8ea2a248a92a6eef62fa9814653ec61de1b0ac7a394a0f991cc406a7d6 (encrypted)
Stealth Address
d6b7cece69289fb433ce29ff141a60aeae58121173019bd7c884eecc7c704305
Commitment
7270fec502e706c5991c4d9ae9479f0eed8995ddeed7c3cafbbc6ef6c006d536
Range Proof
672 bytes (Bulletproof)
Memo
796f21cf7b4b849ca23de5e3eae045c9f6e5c5120f982c0acfa5400c4dd0a76b1746f1cc358cea63ece30feeb41034eaf98b4e9039e295b6a650366cdb52fad468762e8a5ead92186fafc590d6359a194d083d3477d63b267cf98989aaf1dfc23ca92deeeb3ef2239ddca25f2d20592ea591fecc710f20c1aec4e85eca5a2bf9 (encrypted)