# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe6f7ff91da3ea1019a1d25857aa53a1a2db0c9398b5f6ca3ed73aa1265a042a
Pseudo Output
ee7a9cc5b1122ae0b21126c0c386fe30b11ef9e9e14f3dadceb8938da5e1d17c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e8bb5202650de3e0eb68daed009018d3e2a5af2b9b67f6abdae69d18b0e916e
Commitment
14ef6b3baf51f82a29468041a8130911283f5b282302e37a439b93acdd92cc39
Range Proof
672 bytes (Bulletproof)
Memo
5b84b8bd451053d79153ce78bae1d932924cf61a067abd3ec73dea73d84c97b528e76b49abb020e52c6450b2bca2d24db53bb834023a2225dc1d26bdd7298da8ab621a389fa01b512530aea2e461ca533bf13c8cff85705ba6bf5126dfe9cf778219db8ff3996d6146c5cc150a825acf6192281777f075431077c475e62d8ec4 (encrypted)
Stealth Address
822d690d9d3cef168b55f0271a6a5c2d7800b78a2e3686b3eda618c158edd732
Commitment
4a1cf69adcdf7fe9444fd1ba9893be4dd4dfc182f2f4ee461de2efdb7eae9c7d
Range Proof
672 bytes (Bulletproof)
Memo
9536487adc68072b8286c0f13306b6c10a81ae3630989ad006266918583dd43c84dd0a97ea8fca0e0c2b35941e26626f617e4770551310c14741d937df331d257f1ed54c7550302613c96d474ad0c95f7082b3823392dfb3ded5f80ff04d776b9e3a4e490fb234399a9c926a63c668b8b010ee62280c39d9cc6f06d03a6f0466 (encrypted)
Stealth Address
50ea29fbd5f88bd1d8e2ab360d462ae83243371d5b53e158d08660765cadce2f
Commitment
eeb9fd8a7ed0c244867dd6578eadb620c55bf11680b5445f7aaf57f2125ef862
Range Proof
672 bytes (Bulletproof)
Memo
71dcef9e781795545b9f253db21f0eade55d98ef27423b80030838cf6ae37a937c019f253cf2210a5165454789875c6857271c00aa419b93e01cb3e7fad8f47b300a921ba3620babb7464741b1341167463399f68991ba6c55a5de5bb9261dd9580ec5fa6975bb0c3e2ef436cfe81d30299024979bef3171dbf230bf5b552a83 (encrypted)