# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
30481fb037702c84ea0935877b6a15b43bec148ab3648d609064123c9231071f
Pseudo Output
54418d2f16ebf6ed5404124d0af30643a3e8f5f73e899a735c96f76deb144205
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1e76b4a6f974041435fbd949c189adbf461c6c835bd7b90d8e550b28ee6bf821
Commitment
3831e721899639afb8d55dfa76d63c4f21e27a04cf69e74c4146d4092d000409
Range Proof
672 bytes (Bulletproof)
Memo
ec63dbd77ae903ff266675f1070a83b37725f861ad2dc2a552bf7d0606013347fa398e954129be4607a5f77c7c81316fe141d92ce6f6794b078d946813e917ddec1edc43d546cf2f042340c37849ab11b35ece37c8010461fd2c45b32b2bd2c95c02f6218f2f557a0d2aa7c6d501a6dc397c2c2ca447a7c796b31fc362386163 (encrypted)
Stealth Address
76c9a20d6de88bb335908d3dee5641704c75dcc67c14737cb7de2fe7bd68914e
Commitment
4cd5c16e63a82259bcb0d302a8d7c9cfeb2a07ba5ad5ffc978e6eb1ef2a39f21
Range Proof
672 bytes (Bulletproof)
Memo
e690cf9ecb71179a479e6df700047ba3389db6e2bec38f2104e3bb40a5e08a9c84475889c3d0478c05b98a5fd52c53a9ff5820177427368bf94054614afea8fdaa866a890d80c800f3e630114254c6802d6d47b50ee376f44ccfa367e80734e05cb045e5e5f6be7b23c80c3df72aa0bcf7fa98393daff6f89fd5e72feaec2327 (encrypted)
Stealth Address
cc33392a8a81d465afe8b58d039ab9b696ea337be682cdc0d77746b03f375f15
Commitment
30bd3cc814f26a9bf323a8ad4e3a73b4525e97a99b990aeed558b60bdd58ee25
Range Proof
672 bytes (Bulletproof)
Memo
05ee03b010ab30ef7d8ef71478e829c9d438e285d32f8bc6111777d9be9ef978d05fc46f93fc8ac9340673cc94ad9a7dbd4866e6d55108e27bfe970e2a7d8bb8a1215add60a4c90bedb4d2bac82bc69d5efaed256889ab94701a8765aa9f26417e5f9fd5a81aa58be4c93f928b041ec953e22a470cb239ab3003183bceaf27c1 (encrypted)