# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8479430a65eb74619263097771237fe5845dbd64ee0a6c1ba57e6be825ddb233
Pseudo Output
9a7903c4f868b550b12a0e9126d4589654bf9517e3239f5df221c8b546a2dc06
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0c4802d55c8b41994bd3be18e5a642f57670b3e211a5cda209fa28210338bf74
Commitment
16a0c07d2b75fc921255301da5118b710550da9222b67287cbf5a7d38890ad7d
Range Proof
672 bytes (Bulletproof)
Memo
ea2b9bc1321843fc76a2f0c261e06d0dc14ed5fab2462029665cfc3413427d31cd42c1b55451a44c93807388d77cdf3ba4110b9059cf1897a4b4bbfccbe1e4f35f2a3dc9fc7c6efede0ddfd3bb97cec3d38e221a999f8bb3f18ff8059339ba4893cb2a25c2f9ecdda14daba934b83a92b81b1d902aaa7271fc86df431f269ff1 (encrypted)
Stealth Address
343d5950e7d7419dc321545979a03840017c307b5461787efe14f59b0eb6d775
Commitment
eaacd54d92ec6046677c9ff99ea7574c62f49ec3c15697785fca7b27b195b12f
Range Proof
672 bytes (Bulletproof)
Memo
487acc619a8e3ef0021468375ad89ec4e1cc6dc9186be64f336fe78e1789ad6b19fdf335b8c73be58d1f6cd94833047903adc8579cbd9484c6dc7481a4ae8f08a01dc1b940dac1630404f8c0cedc869f28c90f9ce4f2fa20a8ab427b6a22dac61419a1ff79e1952d83dadb6b9486841e80d97b80657250dcf384b41d809d19c6 (encrypted)
Stealth Address
c80444201e4b369e0596e17e53dd8381b8ed7a73461e575fb99f43ee18569a35
Commitment
321879eec71951bd97253836499ff3932f16a328dce87505969e3399a0dc130e
Range Proof
672 bytes (Bulletproof)
Memo
6ee0fe9f5d88be778356c65deea9b78351a1c557f8634175fe886ea2965ca4307a623f5697e7c68b1357fe26a956518aefbf16e18416d6dbb1d4f22cbcff56711e7d08404dde9e9484a3ca3064bb3cc6fb112c7fb6aed4b89ce4c151dfbc7febbb9ae4ef4f0f3ca612e3ffb907d810efbc3285a66ddd998ace7f6bf2ec6c406f (encrypted)