# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48d2e69ee9ce39aad7c3896929f09f113a531ea211b97590abef031ddf84a94b
Pseudo Output
ec8386a63e68f2df9051573ce27213a3f1ff75a66d47ddb48bd539343b71027a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0eb0a5523eb7662246d88cb9ba2cc2752c8f86a4858d10024c71abeaa02e147e
Commitment
aa3a15b2daf8c3dbddd1cafc520187d290613fca143b8dc21f5dbf3c44031e2d
Range Proof
672 bytes (Bulletproof)
Memo
e743afae952675a36c75dc92e6a745f048e596b71321105ae55cc0679fc9860b136d25693a627a20e0babcca75e045b687486916c5f7599443dfad83e7725f5a756cc226cb0c21969829d34a1a598a28ce222e4bb492f5e39819f793462a3fed4fb00594177f68ba5e83f61afa60bfba5bcb1e77ae13279a38a82dd3e3ee7126 (encrypted)
Stealth Address
067273e3947337dbf553699f9032423b9d0387230af6e6148ccd6a0c8768bd74
Commitment
dcf50ca19408a8030e3929f2782e4f3a3a59b203fb8a0661e563b135867baa37
Range Proof
672 bytes (Bulletproof)
Memo
f00aecbba5c272e316e36ffb7a0703ac889c47009535468123c103cf023bdf97742d86001758e1c4683550f47f8339f6dba340981afdc727bd03f78fadb1d736f02ed3f7689c7c1017c55de47f575bec8ead86ddaa67de421548dc911144ce3cac462e5ec2f0d0338a221ebbe055fc888621492a7e31a15d8e6f5d5263386a65 (encrypted)
Stealth Address
3aba927a5ce1543e86b864d11b0f0dd5891e2804c3d0b7752169e2700eb49b4e
Commitment
281305335452fb23cc37487df91dcbecb3b5a7b50fd52da27fc6b9e38d919319
Range Proof
672 bytes (Bulletproof)
Memo
f8515ef8086650420b30fac89eef03baf8aee7d23bbff33ce5fb6f1c71ff61342c3762981f32749798172ef5f97b590824e1c29f96406db31a2381a949eb56dc169f60418012d3163f1c97c78c5af5ca79d0a39e498feed9c8cacde7aa0ba1b1bd749aa4d4f53b923e8f46fa787c673bc3c0bd8fd991c47fdc72e4e9b79ae452 (encrypted)