# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c6ceb408e73208f305b2c211367ec0f90ec813ee9e219fda9f613be80578eb45
Pseudo Output
1449ed3b4fdf224d0e7f8d12738c587f6d2f8a452f91841dca218905d8b21f11
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7a13b10cb1d6a46ddeb1257e362583baaff093d78a0cc10eca37e9c525c03b4e
Commitment
1c25e63c0ca1b05bb3957a881fa355d743ca4b1c4f51f1d06b10fb3c308e8950
Range Proof
672 bytes (Bulletproof)
Memo
908be85ff49a73e412973784e329211f7176cca71de9c32b651567537630c2af47c1a5e6d77811f2f740007bef0b5a947724c1ff5d00332fa9f4124b82a79d85b01d3e8189f787972a765815e320992a0976424517d5fed5ca9870b2a8be3875fdf50a83c4f282e23cad571a3af074a0e1e8806137b4219f64e7a40c10d748e0 (encrypted)
Stealth Address
f6d11010c3951e385959e1fc382ebda49b7febd2bab2e116a29060b8cf66052f
Commitment
128183b4a9c34a6cf1d4deb1aad95483064179c28c8c185bed3d5ae42b076027
Range Proof
672 bytes (Bulletproof)
Memo
f3846bb98492cf3067525755d7820445d1aa8e1be6554f66281fe82dca0945397deaace3ecdffb4da4a9f74a39d38a6790e72892cfe0c65b14ffa74664c642c524ee2e5aee5c725711931f444e624f21b5deb88460ad5c261dce24e27b3758f56e8df7c8c44de9a6efbfe1f1bb83275beeb0cffe9aeb133751a98ccd347332d1 (encrypted)
Stealth Address
d4ee72cd8809e0b962e507368a6a88833dce8e35d35719b8c2e9a201eb811639
Commitment
b26ca3c462bd932b2e82523c3d6f976768f3c0454d67a0041c4e3881aaca6d0d
Range Proof
672 bytes (Bulletproof)
Memo
d50ab5e8744ab67b25ba9698a5b7435e459bb4456e2ff32501be15db35081bd371055c18a9f4006e2315cf020eab8936a5a02b935e03911e1e96af5c430b969b00e547486850c21c134db216c9c147684f2045f9bf873cd4ebf0b6a3a69346efcf18b9ba21082081e9729160abdfa08e76870ade99a8f82e937110855a19feab (encrypted)