# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4dc1f2bbe0a73265649a39d15ca39b5b7e69f922bce76a5b4b68dcfd675671f
Pseudo Output
560fe5a436ea845be238a5636700f6b09e236c755da25d30a5493564b2467444
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8ea20977ba0115cfadf2646c6334379c28918373acf67f8a7e53bfde491ac18
Commitment
1ea45d95f153f0017ba75c005ea6c4c884596b9ab048a8624cbf9f191fc2b833
Range Proof
672 bytes (Bulletproof)
Memo
d96ed7bd0bd0eef80a29bf562e8a0ea031dfc8e4d6474f2e95c35f471f24cefe9c4b028d50806ec817914411686be36a4727e517c5f4978043ffff586fe2e2744c7d0b872db5553beea83418ea1ceac5d519eab00d80ec515031f342e1dd7f566aa367124d561d3ff36d2582f59b4d6bd93a995752458e3c1b8f953449c516e0 (encrypted)
Stealth Address
04b3fecf3011c28cbc5157c9036fbfdc2a895b58791ecb58731efb18b3347900
Commitment
409efb3dea93397271cadf39421d730b9f1b2e6962fc737d20c749195fab3663
Range Proof
672 bytes (Bulletproof)
Memo
0db39e60aab73d4e32b30509076d9e02a833e9a8a830fd1f2c84b724a146028001ce4aa5eebc70b313d6e843db3235bb481ed413ca6a9db9996c9bbfa26dfd2d86c8b6995279a16b5f2f0c1ab2fc569a0e6df58c537c9de791274c58e82e976e34108e53833b1704f2a4ffba00446a4661eb8d75ae706cd6f3235b82a6a320fd (encrypted)
Stealth Address
e47084d93979b175b40b297949c1e1f9fe7ae06baa610c475a83f2faacac1a6c
Commitment
30cd49be7b0f41508814c687bb467d508b844831d09438fb3a521d3e63fd3c30
Range Proof
672 bytes (Bulletproof)
Memo
d9042abc610bd733c9fe166704c8469bab9360a043f48d63b364c7cb72aab93f58f07a37223cba663b9be8a78b3c2533bc07fea98b5cb05e267858b14313d783595c1ca60521a632d36c3aca8b4dddcfdff7eec7cc9e9f2e574a429835c886ec20bb6859a63fbd23543075af97c72d26bcebe4cc3c3ffe8e4cc731d3036109f3 (encrypted)