# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0c6cf4c000ecaff144ed312b230f6ea53e9e773f985d0991355d71a410038a6a
Pseudo Output
ee0d894024470365f0341f87c32c2dca9f4f6c476528d8f1af6ac1ef0f385a53
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
805b3031d13bc9918355db8edbff27683719aeba61310ff48f624780a3eaf643
Commitment
805e49b0323beef73f11730cee14232ec163e6073d72a4904ae3d22088cfee7c
Range Proof
672 bytes (Bulletproof)
Memo
36b50ea3da1771037bc96fe6046c90d15e4de4383135469de703621fd2ff3a79e76d13610c9b15c07da377fe376c5fdc33070eb98fa9dfad24e33abc7548f067701ea726793347b09e0292df9d0fa888d30c5a899c2586972d863f8099fac430c54df662d6ce7823bbf0fe8eed012abaaf18f0700d04461ad350f5a35feba470 (encrypted)
Stealth Address
befac5963cc8c1df28b74aa9cc724231d0dc50003aeef99eca54424dce9d277b
Commitment
300c1045a3a74a7ceac81641a49e21d194cd65c8ed2e11794e0c9c602be7646d
Range Proof
672 bytes (Bulletproof)
Memo
cc27dcf6f9a06d5c63cdca7755051e2f404c6d6484ed0d5623f924b80a3651ce5b5594d730491e941e807065d839c00ead4db930844e30be8778b9261a78f88946983e76df559eeb611bd72ced300042c8f1b3f2e80f0b057dadcdce6419d10cebe9a3a0fafa3eed85d68826d230e82ddf3401ecc8a774b4dca245cf38a73e95 (encrypted)
Stealth Address
b291ed073542b6faa91d91af918166435aa7ccf36ff08f7262e33e29f213c07b
Commitment
c41874f364b4590981ef0ebbcd29eeb9647dba78fe44a66c286144be2430f037
Range Proof
672 bytes (Bulletproof)
Memo
b20a8676fba7efc117e0d9119b537f4805a76b952b9aab67777323aa684e34a2cdb45e91b9b771e3358faed174b8b3355974fd2a86216bdb414c515e42a34d5a83657de004b2540de8590e5f96dd1b2ee7bfc205d40807c1644507b4f8a1dc335ec2698151810a138f38ae1acd013a2949810350dc2e1ba67f51b5fe3a7e48d7 (encrypted)