# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e6c12ce58391ddfad406150387680d8daeade9b3c81e6ebdde64c673af423035
Pseudo Output
0052c8b6be63319fb22ba0dd9173ef8b860c82836769d4dbb79e8fc62d5c6251
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0002f17b46b1b74d40c88724ffaa442aec85b456a6b42decf0cff5b57aa8f1e
Commitment
76ac2bb9063fc594bf61e0c1a2efcab2eb7af0305aeb66b63b6ae966106fc504
Range Proof
672 bytes (Bulletproof)
Memo
7d17db1db594fed27833f084523f27322ba75432d6c0add3be7e1d93f31a5fc96dbac9358f15c2c814000fc8ac3632f9b193bc1b2de8f4a61c6634e897a32bf044ccac80957d262c44cd5d182988771e97d554ce8af946ff70571b90098bcc40012df7d4413aa32c0cf7e9aa976b8c82f8ceaae1cf5128549a2c109206196d4d (encrypted)
Stealth Address
36950280c31c29d56a53e92635fb1ffc6ad995aa14b313e725200f0016005979
Commitment
ca7b3953b12a27f165c00a9880b643f52b85151e9cd9fa74e3d10d338abebb65
Range Proof
672 bytes (Bulletproof)
Memo
1ac9a3aac3affacc388cd476d21ef46e4eb4c7afd4caff22583e33b9d50b75fb696fc6bd1b553219adce1bc8ff243b0f5261f5c667a8966aca76713b95dd61a129bd4029f1956b3cfd3bb2c30c643dc125f5d4ee6cd9af5ba0cafbd18d7f744f42e0a6137f8a6f3f042d6643bdda7497519c9fec16de3af422da329623611cb1 (encrypted)
Stealth Address
e8f4d400fbeaa046c1b23709bf0f4af0cef4543db2daeef63939e85047e8f470
Commitment
f48403f670b1752c5940c9a92141e79217eaf48fc4fa2f6e3de72c2334c35416
Range Proof
672 bytes (Bulletproof)
Memo
7de768556342cb6412a5d1a61b03c4b683b532637cf7bcd24622fe871865b64d82aae119d317f9aa0ff519646b70c819892f66635ac8b1ba0c56e27a029c8807a5e84dd0793d1c708082608d74efb5cfe533f1a1c2a968498a04efcfccd0957d6e0c437047cbd421654ba5ca6f46f7f283eb923586c2848777b0e8f6a665b2b7 (encrypted)