# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8229e798d6d6232a2ef739317a6b25e09e0a7eefd7428044278bcc056ee7e547
Pseudo Output
34beab16bca3a5178908b1775b0888e5541e039e32fdaec7695629df78e5d933
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e4f6432cbb644a82d84e5dcf0e4dcdc9daec81f012ecd79af8132f7f3abe727
Commitment
ca661bb9564abcb46a509bec51021eb9d9795b81352721e8c485d87f207a4052
Range Proof
672 bytes (Bulletproof)
Memo
117611f9dc54779ea2279223be01cd678a93af007cd465fb965e27b99286ba35687e500e5b38594fad5ede686bbd07c2b77160208cc9fc884e0fa9939b256b8e496eb2a4d7b50c4e28bb89e9f9c7451ac238a7e2201c375b2a25eeb5d0d82c8eeb3b52c249c5c0700fb0a22f44fe25f25fe823d1cdef41b71bf9f512b89c9b02 (encrypted)
Stealth Address
8c134b015b921856e03915a0224658773e0c350ad1e16092b2df9d3448654222
Commitment
e43d9a736cda85feb8417ebd13ee84d87555d8be2ad6e790678cb825c65f1a0e
Range Proof
672 bytes (Bulletproof)
Memo
8c5eea3ac43861b536720e9f8846e005f558068675212b8be6f46fa05639a8f9ef4e9953caf48e5f6e0c262ce2012fe175d370074f61cf48b486f502b79c4c9201af4abd90958f8cb7ea460ab21762f8df49a811bff79140215c74a0123e6e0614444796d9c16a42ebba6093ef983faa88f21e8d4afb5d6b385a8b27c0729ffe (encrypted)
Stealth Address
3071cb40c95a62a5578698d6273d8b1e66e85381189925b0e2edb3d3675b784f
Commitment
049410392e58252e88f4b0dab022cd6ed834a7679c38f913649678b2c49f4710
Range Proof
672 bytes (Bulletproof)
Memo
0feb75ca07febacc230428879de929184ca2961d531c4f8ec5276b8d821f1dfff03d292d33b72442b11ea7b52c7c3bbcffa49a91a29bcdcfad14a2ceef5b67093066f6f74758239b62836100bcbf32851917d7d171b95022b0a352773d91619d2087f33ffea1be6f3bd064ad20960375a5871e6bcee77952160742227c506967 (encrypted)