# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8c9d3b15ee18473b4e1802d79b922da91a08646548e5748f86974189b8ae2778
Pseudo Output
ea006ebf8fefb1fd0f7069eece4c22cd86cc1a411960decafbd4d6112077bc18
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
046f67968a66645170224372f27e71205e9dabf66b202cb509f71f98452b5720
Commitment
1a8da3eee12bc9b6bbb6b498a2d9518f35241546de3904a5ae2de7b515577911
Range Proof
672 bytes (Bulletproof)
Memo
43fdb982f5733d644546ab8f916e4d1320446ee6c7cfad4470565e380f637a8412cb16929ee9d03d4e0773f106440eaba96636809e14d56cd62676f31291ea928b5b13e46ad16d13e0aeb8ca89354e02617624dccd3696e75acadcff49cee4cbc403658713f64072bf61f653eed94e18ed84f1e3487b361ec48fecf5c2f85589 (encrypted)
Stealth Address
ea588603380b6abd6a15d7b4d284d2cf0abf8832bc5990e4c7a5bbfece34ab76
Commitment
08b1bf369dabc932d2a80090c0556b7efba202f339de7e7e06eedec2d8685d71
Range Proof
672 bytes (Bulletproof)
Memo
65a9c49e57bc5cbda5029bad44c93d2f3b8b9f5a30b837389d42a9ac05ee3f935c3044fc58baac709a0092e307b72a72e4dde023ea4137556a5cacf7c2efc948a2d2bb19d69b8a17cb9dce7ef4aa0e7cf758c354f2f3a3075646cdbd89c1b33c32032718bc3caceb4716e37ead6a8fb40a2f98928700d44c785152021a5d597f (encrypted)
Stealth Address
4cd36946d56cd1c5c7539d1a2d28b3d6352aef0cfd575840353e52e22fc8ce0c
Commitment
bae21bb182d9b247d5400b231c14da6da82642ca67d69645980a3e7e1a514a26
Range Proof
672 bytes (Bulletproof)
Memo
f4f7999b2e208ab398890dabab48571f570b92851bb0b28b892052741003db4efd4e38c26c6243e89d81f6e4371a59664c265d34956c0062bba7155e3b1e20427c688b33ba92fb99cfbcc56aa338fd756d5b0a00a933eddab6a6f24622cb0580aa579cc7f0479f272f106707cbe1474315e9d999b73cf9c56e60979883531d84 (encrypted)