# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
86b05d8aa04d2afa307dbf788baed53ae911c7201339ed3222c1c9119bee2840
Pseudo Output
16573340ffce86a03bb1ba3e5ae7ce593149edba8eb360e102064a757570f81a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7a955e69be0f60a97dfe4766e08a4dd23f96c03e4fe53ed922d2da5dd0e13f05
Commitment
2c20702d553ab0b6a3a9dff5eda531bca98c08baad20668a4c5dfb0a04e6215c
Range Proof
672 bytes (Bulletproof)
Memo
0494531457df3abe04800fb8da0e4854f95d1396d1bb7e12fa6152d5733a72c28134433b7c08995cab11ab462c39ce6633efdf97f42c9a5c99422f87265b01dc7731dbfa641d0c3a9afe0360f4d538a75ae97e460a7fd8fbcfa6b1762f694ab0afb92a8f59793385a771c7b052b650e2ef07e0eb2357ee241778df2ee9a8d7de (encrypted)
Stealth Address
18b2aa0bdb3e392ea4b829bed49fe15387c17119de538cb2c4035214e4506508
Commitment
1885f2be68940ba36458bb3b883d49341f99d49c2451ef4186cc3ff94c886f11
Range Proof
672 bytes (Bulletproof)
Memo
4d8c79309999b54b245f94a03788c39a85b855100a545d31806dc357ab7caed6f67e57a6f87a9e2defaeb1d0a6147880a0c4ab7ccdee8c72ac3f9a3ded5e1a0acff20ed81e7b39e884eecdad66cf5965504f6e45f5bf8e02449e47938c3c943e0ee39657526d2c7e5a08117a314bbc88b0711358c4487936566b04abd5311690 (encrypted)
Stealth Address
b003950edfd709034dbef5f8a5d872ee9d9bddbab9369ea68bd0b2045463ac76
Commitment
fa45104e205b2851fc2f4b19bbe2ebb56ac80dd98ab91454ef122d904df7912e
Range Proof
672 bytes (Bulletproof)
Memo
f6f9d75956e41718bedb76e32a5c45519edaf6684b92dc18e6dc7f7648424b4c49e500c0aedf4a06f5b5c987d1be4562787bd0b8093d44c9e823af54591e9f6a26492ce1c396c1ba4cb5d27be2dd0b6056366b373ae156ef70adba702ea148b3d198120e68e79fcf7aaf810cefdd81e6d169e0fc053ed8a50e906ab7752fe9ee (encrypted)