# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f093cb90f72a1c4f21bcda91ca2c9e6e259b54eaf9c1cf9abe9584b83db25937
Pseudo Output
b49e61c671d95ec89914ddcca217da66328fa93f47d2e1d333429d402996cb3b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7e6ab42feb00463f426ff09684e6f50dfb95224d66ad97b1ba6f97223324b424
Commitment
f4b6fed097c76432fc8e7f0711f8c0709dc53364840ac785722152f92b878b7e
Range Proof
672 bytes (Bulletproof)
Memo
0b867ab00dec112986359e2406d67a836b273a66988506940a25039f16ef8842aed99e71c7252440c301abe2fd7895e4d6e526f9688b34b2a8a1102274ae2d57410bd960b3ec66d7bb2b501c6f11b89d3b4ae819a2befbc6f7cc6426dfb3dbfab49ce70f941a64eececb57c5ac9a4e91386fb8ec827374cfec432ad1d5896ef8 (encrypted)
Stealth Address
7ea8a0784cc70b70d0f5ba4c1071cb291bf0ac6b6ae38d2e5d98af7d68f4aa20
Commitment
94ee7cccdd9648bbe79646a5a295c9d5677b0414fe4e1a5536937a118cd9d922
Range Proof
672 bytes (Bulletproof)
Memo
73c767c33b2129c2f0dc5861efdd605f07b7afca94d4ca82f024f7092be60db4675058d0cfb6297b8b386ce06ba6641b620f737937e5d6cb11cab6d917ce0ebe7b7c785b029013ff7597b45bbb4396d20ea0585a8913096be8c9f63b52b4adb661b48bb63324eae9e041fc8cf43433a59203fc1b2a28c537a5ccc131127c7cfe (encrypted)
Stealth Address
5656ea0f5a9e80aeef4b5a426afc63d6563a1de2a007b126257a2858e2447247
Commitment
3ad5098621d6ebf3503480397c3c82927ea1ba28cdd51f873a5497bf83125248
Range Proof
672 bytes (Bulletproof)
Memo
e8a3b78e4c3061dc5d0a7c7e8eabd22d3515f04c6becd6873c2a069cc8ec1fec6451f8c49b84cc8f7d38508e8920b10ff8b4564410a151dbce66e635befa1f4231f5635976a162f424c507e836d4a357d6345e12ae6c1dec76ec47a2eb1433060b5050ac5649668f1208b8715b74b4b0a25e226475b19eeb58a7852028e3b72b (encrypted)