# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be59d37bccd0cd82393e3c4b965f83e9cfff6da6d3873069b974628901c97477
Pseudo Output
003bc0f702c1e291244c2fb494dacb4cf70429e80b1c850fcceba337a1a9927c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82c207cfa772104d48d9d6f8a9a861aab8355dc25ef7bea083b1d3e8ac48776f
Commitment
2458d3b638cb12ef78be1110e435e4d4b9e35148d9a201cc58a196f661f2ec41
Range Proof
672 bytes (Bulletproof)
Memo
edc70cee64849fd0db3e5de4dacc5dd20223c4d7a1659a320c0f6086ba982465625649f967ea13b21074e52b411450719839f8a6cd1ea6debb2fcfeb9af4dc5477d26b4438ddf956b368077fe8c3800f4426c7ea2a612cd741b6d7560033425ae8ef98635ed88ac2c800e23d111e8f91d266f565adda32dd03413a867b846087 (encrypted)
Stealth Address
da6333c2569e5269b72dad3a2b49205c21856e24f14dfc9a3992f615fd27222a
Commitment
b096b764c301f785113eddbe9426283ffba7d90bff0ff7b2baba2e393373f64f
Range Proof
672 bytes (Bulletproof)
Memo
455a9b68cc8ff95b16653029089b58bae2d48d1e503fcbdc0b447d8ab2d13e34caa896c781da0f8b25b31f438a7f77f492c44293f98b35cfe6eda81511efd2859687ee1481a770039f3e524a9b91c0efdc80fce5b66ed876f36dc869b0143989d0b0c14b005857ec25619be2c4d69db808ede58db4d9e1f0719c20997a5974e5 (encrypted)
Stealth Address
90ac2a622527aacbdc76c26772cb5be240577bc9d50106018b5deeb6030f8442
Commitment
d2180d6973999fafa6a174eea5a00e3555cbce33f34ca986d86de8e5bf2b966b
Range Proof
672 bytes (Bulletproof)
Memo
c0fc086b70f11ec179259e001a05009c573c6f462461a0c7ced464409ce649702b49f959c56646998547d354abe8e3eb685df1faa0630c049446ae7b01ff9ef644ddd08a1d109f7da9f9b65a25dcbccc146155d75ac0c76848ce8cb1eea921c4384fe4fb4594832783e6abf4f99d03dbfe14f2649f61c19d79a371f0e5e90bfb (encrypted)