# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8e2dbbcceb60e832fe2d56a47d9d8715c128a03f63f0c46ae69fce1f3776756
Pseudo Output
aa0e09003450a934180ee8424fad410f07bd45fe79e2b3cc78c88e1978e86135
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7ea01f83ce0c78082b651774222a9df868960e70bce40d247ab9266d00657771
Commitment
4ab30e216f430b4333035908cec73bbaf946857930bf9639fc258bc56d11ed2d
Range Proof
672 bytes (Bulletproof)
Memo
a931d8344625033818ad55861ac0ec5a10eca90b22b65f5d91d63090a3e1290bbc1ab0597af109dd878c5e1deb5b58026a035558952437e702434a2988e699a942944b6bb0d97d63753ccd93cd72a544391accae4d14f6c24344f2626d518c357c26d36ef0ec34743b2704fb096b95d74cafbde4e5f96297c2addc51b5718ea0 (encrypted)
Stealth Address
d0bc9b82c7028fd63f54fa1702ee0ae591b8d5d5ecaf8639ad6dbae370266f06
Commitment
3e99dc631f01a46dc05ef53793e57fb767761068168682da84d72780ae5f0d04
Range Proof
672 bytes (Bulletproof)
Memo
e6c039ab03feee4342fceeac2b0a4408a63c32197ad4ce1a2f5451229d15c31684f2c4930095533d88287669db4ba255513b3572b2ee7a36b7d385e8f8567bf669c54b3bc3ac323e91c29851128780e02b6e5e536f1a46ca75e553bb04b4fe44c9064fd365fda5f6d7c25c673fadcb989dbd28b6a9f021fce0965272fecc4878 (encrypted)
Stealth Address
5811693524b09db57f64e480d71c92d46ca217e3020737126ae9155c4002ae5a
Commitment
9226fd722a822926c65e89d2fa06a687fc22b8d5e1ae688cc3265f9a8e18b507
Range Proof
672 bytes (Bulletproof)
Memo
1b9e8fd4a3e07cc4d96b9f2357bdb6d24ea1fd11b105347e38d9d76b9e87e3cc23cf90bcb546dc4169bad2c4dff52f2d6223db447b1c6fcd45d55f9b729c20a61b2ca7b21ce501b64c81e7f617163d2977c3aad9b916d71d088fe616427318b492c42990d08799a98c45580edfc7c08e37e075ee0ee639b2491e19f8cff8eb66 (encrypted)