# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
18d2dc888a3662165fd58a35a7a26414b9ab9f83796e75954cd394ef5e6ff10d
Pseudo Output
6a10ffe916e1365b23c37ac58bdf16137f2a58dc46e3efb145a87010d3e4b478
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eefb81792b69d03e58fab5f82514fcb44a41d0e03658f1bca7f0b9bd1da7ad07
Commitment
e8ca8f54cdc27cb8d374bd6c313cd8cc8d7f1843ee270fb7fe2d3618dffc385f
Range Proof
672 bytes (Bulletproof)
Memo
b8bb420a347513b34b68348c78e99354d3076dba6606f165d306bf9ee3fc2ab124aacc8f33497d15be3963efdafe88cfd59469685d553faac7b3bbc88a6966ac69caadb6c0d501d4da61e49d90c6bacfd8767be76c4349fcad4472284829cd13591bbbfedcac2d8561a16ae3507538f5afddd2fa039841738a90f05b69e022ff (encrypted)
Stealth Address
b49008b34fa834b93232a56aa31577976033336bf32418b0867f19f28cece600
Commitment
ba1a12f496e7ffd52d69124bc875e2fd7f3f7e95b2e03582f477e112868ec561
Range Proof
672 bytes (Bulletproof)
Memo
a648fbf6dac0599af82a818060e2ac469f0e4d4ba33e23968423095f38e0b23ea139cc30b5b1d2b9dcef0f55ad17d3cb79865d3f21a17fc70e560d4779940b1170a493648c2431ff70fdd4f42d574121e380c693bf1516ca73c38bb2844ca5d3655a7ba0efadfb50709549b8d258610000c53c8ef0dfa58261ec6d0e601a155b (encrypted)
Stealth Address
383f73084a0e9bf5ef05f095ff154b7a42d37b8e46c2e8a1863709d1368bdc11
Commitment
b6cd526a5fc7564d0b17d3c59c103691bc89aa52681b25a2a5e474360bbf273b
Range Proof
672 bytes (Bulletproof)
Memo
6c71f816d81ee93423d3f7f24ea1852849fc9c276235fa5710964e5d121907ea0632c672a662bd08a596290b7c1590123dddafeaaa4642dfabc645de448607f12de24458c4c010c1dbee0db4e42b239e254c6a87a7212b4498116c1e973b1b25a9aefafdfbccc73dcb930c7c23474092bd1a69f8a423ba85ebe7c1e6d24c6ee0 (encrypted)