# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8ac0ee612340a5e06c967bfda7d3ef582e8f044e7ba7fa020fd3b5ccce2e763a
Pseudo Output
ecbf58279667b1a917eeaf8468f851dc30107fb2e821734f3e472acb312b6c67
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e89d9e4088566c4fd84d7ca84b7a4cd02db414ac3a5234f3c724d80ca3585d19
Commitment
5cd88eb6da56f4fa56a58ef88cd0b052d46131d919335df3d51a769bf326201a
Range Proof
672 bytes (Bulletproof)
Memo
e5615df8299f8ac605d7a90eb6123c3cf27d28dc41fdb80ab75dbc002324fd18d8c021e441d7dffd352b95ef933ab01ce77050c89a1b315170a58d70c34ac734d99ce4d2ea517713703f32b9c8402b1ce5a03f85a37374ed3b167c3e75fff728d06373f354e4f7290d779611c065e6c271d6a1653f0a37f929a5f4fe5bc5ed7d (encrypted)
Stealth Address
4c39c2251819524dbe5d82c97b120336da6279dc15fbbd3ce2ca1cb7674a3f5c
Commitment
a47c4d76d189f9b979cfcbd41ff784e637caf0da81661f517ec879cf248c3463
Range Proof
672 bytes (Bulletproof)
Memo
cdf46c80409574ee05f9c175ce12fc3bf184d68e73bef673c2e8a9db62e034bfa7b928b5a95dc4973d9c3ba4adf17a535e38a866892fbf07f869f2533d26d758ac07bbb3c5c77f6f920c11af77debc2181693168f7ac4ca99cdc54c33796fa6c4303f9cd5794d25a5454e07c154c0e96cc6ac786f7a59b5201bed02b5b783189 (encrypted)
Stealth Address
00316c4137b9c93e008629a785569b60392e1314a6b91b79285c6afdd2390154
Commitment
eea08bb0cd6ced563adbdbf36e74400cf73089d878cffd86b292aebfb797e263
Range Proof
672 bytes (Bulletproof)
Memo
a4b80ce5bf4bea05cc70276f9de2d7fe598df308614034e1569cae657db0b811480389a79509c199dd99651395f8da00c9f683cf2a55a251c00b53c03d2cde96d9f5e6375f07b1bb84ad1768b46575ef2b936aabcb273feab48c7e47e5064c462f85430713fdb107f21ed8a4785e160a3860915b34897a67d06dd3377951b416 (encrypted)