# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
345d5b5a3e94e003645ba02bf4653769426ee864969056bb2724118348f7bb18
Pseudo Output
e0d7ef687ea59217f64a7ebd271ebf2ebcc4a6939d975a028a02e46e7ebc782e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ded9aa7a7796f3e26223e8b2eb1834b1c4f589765bd602147147d007ac413827
Commitment
4412c68e44e77311be5ec039e31ab1e2756b8f34f35b1f1c114804c94b75d81f
Range Proof
672 bytes (Bulletproof)
Memo
6500054e181d749ed3c1634e0c59f016ca0fc0ba1a25f164f2421f7e5fbead7b84bc738215031d532b2d9e78d757fcb308d1a5eb6fc201c3e0d1f068fcf7e6e274eea217740e4e601e0a3d5b76ae14ced2058d7e5c391a6c22db4ae3405bedc397d291a73cebaea33a323da34e0db2173307f3e06cbf50a801b129524019671c (encrypted)
Stealth Address
ce4a5010c6652110462eafb8b64d78ad3313f7647cc0a780d9048a302996be5f
Commitment
a6ba03570caab3c5d4e51ddee71a1a0b31ea54cc45fc96d2b31d4e411b4e8948
Range Proof
672 bytes (Bulletproof)
Memo
aafc18ed2e112e740b069db0e12f3f62c9f2b54f64d8788fdc40485327f1c3ae50407292cc33c959166f9e6ccee65979ddd8b3bec1822f2e5bfe079f654d261bf3e89f09f11a32b512c7bf2825edd147435aa5866a8368f079eb981ce4ee1d18a71ad25afe7dcc766f9ea2ad82c1b3eeb4ec522e6f9242f76c3ea9a227e691c0 (encrypted)
Stealth Address
aa1f63782189d0940ba09e9ff7b1884a52d6d2ead30444c52f82991f4f66db04
Commitment
3058362c609fa385faa05e1371eaee38c315b518c1cd3c7825b9430b7212b748
Range Proof
672 bytes (Bulletproof)
Memo
ea483bf68795690f88cc6b0afd2fde6c3278517ea6d033ead16c70cb7192aab5a5f9c64eb23e55ef8fb4b8c78cba71d8c509ae4f38a071ccb99759e27113e9f019b4b975fc1086efc655e0186375aab3003c3939caccf914b2435e6a518dda0207e5fc9ca9f3f32c5df5a152677437995599b54f222fc02b1b928bed2ddbe66b (encrypted)