# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
44cd8215bc0cb0f068b4f3804e701530823fc240cca02dd7d99bcdf66066414d
Pseudo Output
f0e389ad3832196792b16d2d27bb5ebede763ea53f459a88c03f6e28ef481e34
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
301b7bd5852d05d7ba3932ae9b39c4cd294a6edb466538d34cf0d0fb6267ab4a
Commitment
5e61d6916968a421018be0a5eb80ba5c0380aa5c49ded611bbba3cdaa6005b7b
Range Proof
672 bytes (Bulletproof)
Memo
f7962918b7abad0d28f1b9f98b82497880300874bc8528c86570d5f83f8cb5d777a3cbc64fd02dfe05eaba01d9543bafeba5139d205c389041d2eb2e5cdc9ef1e1ebd04e0fc64773b96dd53db87565a9a212f907bbebf6320c77b724088f27c2c52abef63a5eb6428dac4fc4d0576510aeb8bb1bce94d4d7ad0da3e2fd663e21 (encrypted)
Stealth Address
b853e91a7b6e40682e2be464f9c4ee26900388da0efb44ec256e1a389a840032
Commitment
06d66905aede69f7dd17908e9a795cbf53ddcc5226c6b2c405020e4f1bd41a45
Range Proof
672 bytes (Bulletproof)
Memo
6dbac02ad74ed5d2f6d1418141026a0ce6cb7e04ae26fd66c41dd7cb37459e3676a28a92215b5b8b7547f51965686668413c59d53c816fce093f4db82c7bbfb489c2a94558a7369086d259ac9cfdb575c6cf01fb6380a28de602be59de0143061c0d9dd58ce58db3e2ea56ee7d34eda66e96dab8c928c8f27210a57dd54f1d60 (encrypted)
Stealth Address
3a4b70329169c2a4a894b2d005ac31abf3d2f21fb01faca01f49f035d7e41643
Commitment
26135264e29ec232687de072a784a9b13ea986bb6109f730d2670950942a3171
Range Proof
672 bytes (Bulletproof)
Memo
03cc6a09329a2dd59b0e34096edf5ba86b32f39310718a85727dd8c1c38fa25722d9c98603d5cfe9d41e8cbc75a42b9437061ad46908307383e5e8b948a2782082e7c403690dffb56a9f15258cd05b2c519df0b088cc334b66167ee38b87b08cd255117ee8edb4d7dec73d1109bc09d8d7c4b6cd8406aa9beb00eb08e0ec90b1 (encrypted)