# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08db38ea84aa50dc928d7847346d8bb4f396414ee4cb89175943134045378d55
Pseudo Output
d6d4fd51a86109d709fb60188187151faf6f267ff55946642ab98fde2b3aa80a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
721e3d682b733267a3ad40c1552a64be70df429d401722b1f2972a9e3316335c
Commitment
6214b6ee4bbf9d5c3891cc0c70c7385b55e998384fc943bf90a8352480f9ff2e
Range Proof
672 bytes (Bulletproof)
Memo
631fe26c367b456b7a68aed5bd60d3cae650796164078d674add7c140c0f34517c6010ca56c34bb09196c82014838fd18c5d4ac73c139c41692621af7c711320b99683245e2eacdb69a2369b0f225f28dd12e43058d4860597f26a0380719dfc3fef1b1d41d0c9d216d6555b3502bd843c9ff1d8415e0dc6a656a238d51da4ec (encrypted)
Stealth Address
2813e1c6922840d83b77d74286e9bf9f7c41a3b5409c920bf2e53117e5ca0c62
Commitment
542738c4fdef629da47efdebfc5a437c01e49acbb3683db1dd6934b24d986121
Range Proof
672 bytes (Bulletproof)
Memo
256e2728240582404748f8e8ec6a99f93367fe2f789af142a7d14a7285c1e38f782869d3243d1f31ce5bce0f8942014b505e02bd56e0413242a3a2837df8128cda083d4a6ff6e7ca56a152b40617898773bf12f5779e9367f362f06eda13d2a6b392e752cdcd54d67008b49ad78814061bc4161a30b37058b310b89e202fb03b (encrypted)
Stealth Address
7a838f977f1af9145da4a03a47000bcbcadfa3466db1bd4c77b439a7031f7465
Commitment
ea50cd06d29dc6d8208f965c6360dbc580d1fe6cd094fd481b07c02b03383923
Range Proof
672 bytes (Bulletproof)
Memo
70bbd204ccb5dbc269f0c6b6635a443d8f6c56528b62e4a5bc0692b80a4b1d42aa41b471fda05118a9d42c0e990e5edd4d2bb41df41886479beba74fb95b43e6172613b8da16fd44fa9915962bcec39f90be7f805c883f33d4c42cedaf95d96f36c8ebc1ef3a1f0d19b02af66bec539e04f6052918c11bafe77de50fe938f25c (encrypted)