# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1c642eb4c496e92b874fb47d17cab3565ba355a55d17cc649e8c8bfd6126e424
Pseudo Output
6c710ce57fa462141335e4ee99ce26e394924d3f3ec3a68b1479b1a1c350bf1f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5ab64eaaa79bd40a91e4b59b65775afa32011f67c7d52b6b2ab16ba91417f82a
Commitment
644290e3f4be56eadd311e5465ce30f4bbe7eac50950fe7f39afc88b4cc71c01
Range Proof
672 bytes (Bulletproof)
Memo
2e09bbb7ef8a4426aa760d31a6c5aeaf0c0aa1e35e7677d13ec9920a596fd2cabbbbfffcc6056a65c50907d17bde522e28e23cda77dfca48bfb61a0517b4072147a894cb06177323f769fa8e73c7daea57aea8714164732ae223511b76df1e475a4ddd3d58ca9778e63c16dadeb70b49e8246a0785d1838878194898a7eb5d3e (encrypted)
Stealth Address
d6b712aebaeb8e039ba90626ec2513a39743117b02819c7a82e88a6c5c3f202f
Commitment
d8824386c1c617bc4c499259eebdff62a4509716de913b1e5c9ec3c482a7e46b
Range Proof
672 bytes (Bulletproof)
Memo
2ac73ca532989f6de99c32bfd476ca9c3017ec2488042b81e81bb5d2a24da7c6018361754941df9f6159e839ddad734af3d34e0349dacae22ebf1153eb51b6f208644c21ddb708866df311fc3b8e72b487224749bc934c345fbb53d82034bce415e8dc0c1b4b4c4d8af2ef1a4a39176b0acbbe162e8089cd36f4c4acf74c4814 (encrypted)
Stealth Address
083e038bee2e282dc7fc30221ca86f0b95bba10d3908a9c4c4fd870d885d872c
Commitment
9039eb14e043588e5a15e66af2f59502d610d5615e6ee43dd4b16b4ea515da34
Range Proof
672 bytes (Bulletproof)
Memo
f61032fa1075e31818b16cb188ca28d1bc67909936c4a48178150862f075d19c3192ac9345daff07ed34850bc4a5810620e19778a21f8db70e929a4080b162013829655e1fc1256b75a74661a8f7dcef62cf76d4af82d9879449766dfb1fb1e3d7fece81129144125b802c49659f5277c88f74dca745d0083932ec14354db797 (encrypted)