# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f605c19a0abab458f47ecbe220156b8c662f1f2745d0a3c004b850ba7b2a236c
Pseudo Output
c23c1e9e79abf6021672c93b04883781901f909998e7782b3dc2f06410cde66a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a604724a5ec8b71e8eb69984db4cdc39da1ee9ef754a356eed30e2d584569502
Commitment
feedaa81bf63be3f26b36ae2eb70ad6a67faebe7b301c4e52e4f87e7858a317a
Range Proof
672 bytes (Bulletproof)
Memo
f5f2d1df8dc49bbb949fcbdd86ae3ce38bf6590366285f509fb5c626cc111dfe67457bb0c6dd2df266fe3ee94405fd0bcdb0f0d69c9f7e9ad40417d383ebd089adc38432061c94d0890bbdd3b7865a7425cc30b909ef163cacb5a25531b6cbc7ec4ee17ed1f49c693cc6edc39e588f165dda6d63ca6318d047f953512825cd0c (encrypted)
Stealth Address
9ade24b9c48c0e027bdb09969e09000b09e51cde085e8227e804c0274114735d
Commitment
7eb66b0c7ec80fda5140d2d6010b56a079273c5b9185556af6058cd2e1ea2a2e
Range Proof
672 bytes (Bulletproof)
Memo
b8318c2ad6803114d6cb0f9f10e059694db5bb966c78c5b025a34e9a35bc9ffd08c4f12bda0f9567d36409f039485c8b1edd9401e7807109431ab5c6d28ecc3252055b6874f5de8d673fdd80d8ab6361ac87e0934254f19cecc5871c7826ac5889936a5b118755bad6821adf136e25a2537de794e0cfa276f9b0a0e39d71179b (encrypted)
Stealth Address
3067c2ddf45779b94cd97a62eefd28a452543b4dccaa2413ea4d337307adb54a
Commitment
c08893f8f7ff37f87f686017cf9164b08ba9765c0f6b686683004535ceec1704
Range Proof
672 bytes (Bulletproof)
Memo
bfacc569776c0fe6d8fd847a2a330128b797bc0e018160aaef43c657d6d0e94b18c1f48641a852f5514d7c6788701c24e5eb8a0a5213e041aec9327f790e79a1d0daa5dd8b03bc5256e754a7650becccae66142fa015d0dd540b5b991186f0947d5561560170cf540d20e22a4f6b4cce10107f70b53add43986b6017ad018a8e (encrypted)