# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5487d5e519532e0aa10654a4a56f35a2edd517bad6fc42b3003720caadef8236
Pseudo Output
0c9d6df5a219c6aca6b84b65b80358e2b91efab9573869061e99c05beb7a4e16
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
34d35557916f082bdf9d51942694fed7c23fe89cb34d5310bc1d772a7d6f601b
Commitment
c4381a567c4b529db70e7424f26f1574ae6d2f953fe9c4f3193caa5ad5f25c6e
Range Proof
672 bytes (Bulletproof)
Memo
e5f9cf8913bbcfd5be0632e8f460f59b209efb73ea5b6077e315f06f4625fb4a3c93f0d22a460c57e300887e0f003cdb72a29a98e9b53ef8ef292bbe5b5a210ce69810ba429f01ada7316f083f9ce136f7b3d870d291e8c7efa8c56c7edb6bd6bae5102ee70a2ec93a1fec84e30529a21f1d73ee10309fb6002b94008ffea819 (encrypted)
Stealth Address
a425c7d90a261fb125ed6779fdb508b593ede7b85255626a4613d5d2514c9722
Commitment
12d6329c67263bf0b4834a71a6ef0a2f15bafa05222f1516521799607c8f6e31
Range Proof
672 bytes (Bulletproof)
Memo
e51a6bef6232c4fa031197769590c1d2fea721cc82be4717c22d4b73d46bd024c4dd2cb221986b8d283d3b916316ea47ea822fd5543987de5fd58555979b49d10c31e72d40a31be4eeb450806cdc58c7b959726653fc72e463704d9ae6e81907348737dea39b176b597582d1d389065a3fcbe26fcd1b39d664e7e4388a2505fd (encrypted)
Stealth Address
ba330c9ffc71e3d1740cb078baa82359d212532263c3e644bdaa41e2f909e016
Commitment
b0966dbecbe6ed32f4493ba828c1e929743ba345890c583526bd900d1258ad6e
Range Proof
672 bytes (Bulletproof)
Memo
ce83501a8eda7f5cea31cb044c9b8a9c10aea39b5898e192f000d04baf345d9db1ebc819424cc0cbbd2f0e7b80f02a41122326255a3a9bcc46db1fa425ebe51c54bd308f0735a5b9154601af5ed305560de203540888ae08656479d982bf6ecf5dc49d99e3cbb10e657aa86f239730fc13709423d063712c17d428580794adb5 (encrypted)