# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8686f3b8ad5bb63d8971935116adeaa8e08561b2f2ac3353dfc86f0acf894003
Pseudo Output
c0b1ebd037136b2ac15f597d19424cd952009a330da10bc987adf52a4f152707
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e4363886ffe6713f6be5f654ba8aec4e762a0eb1b10f02740b430c1f2398e233
Commitment
9ab34f48f330dcd4641ac0917921cd7053f78a2504f375b4fb8cfc7a4e8c4212
Range Proof
672 bytes (Bulletproof)
Memo
e073d30ad931e5cb9b22df11933f4335f073ec109202602cc1fbdb49258c0dba0a0659441b432af0dcd9cad9276dc872ee1728849100454de6b2c35e5d2f75cd627a077eed96b828df28c49cfc20d7e6d7dd76728ac32a93429d2f2e418f86935a92a08200a456077115484bd77afa0616d043630f29b0da9075172f0fdf3b7b (encrypted)
Stealth Address
20523999b6be8ee0708b687dab0d2d6d85b64a42de89e169e8c4bb1a1c76cf05
Commitment
dedef5d63a942ed4935472f1a5b9c4e5d6ca4c7d58a818314b7aec968dca252e
Range Proof
672 bytes (Bulletproof)
Memo
d142825ed35096ba6a9072d4967d2a70eec9c272a78f3ff3487e85e77a2d86509594e6f4c9cb779e113d42bfd7385db5952c6a6d765e89798deb70bbac3d28ebff1a11e88ca0673f767dbd5d73e11100450ad8a47279b2c87695eab43c60deb6dc8a7c38dc0f91753e2b7b289b4454ab02b6f88e760484a2d639942d73d5c86f (encrypted)
Stealth Address
08e5a4c71f947d8d42f7b4a437e84f2b0a0b7bb03e38e0f981ff5539e57b8f69
Commitment
2e909c6b73dcbc0defe2f4bcfd24957054d50df4226303ddb8401deeaddd0a7a
Range Proof
672 bytes (Bulletproof)
Memo
b3c0179a598fea350f6b5e3d20784989b478d710323581b5664052458eb9d57dba1e7eb3dc21a348430673156d92dfc95fdce0c5c53bbc231a624039403fc5453b78193c441c2af5da626b8cb044c698a4af00bc1260080a0c1b76dd7184bc49a77f471638ac8ca62c82538e20a31f0a75fe2e896cc1fa9698330512b5e70536 (encrypted)