# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ba96027fe097927018f367fe1dfee3a0022816aa40121981b81753fe2e713277
Pseudo Output
403edc421bf54371238ebf47d02e63f1220b27ff297ca6b879e6d45a5582ba24
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e0f71328f9ebae6f0418f5c9383eaa200174d24c75d6c83cd992efe4207ffa17
Commitment
a8ec1eea4048bfeff4a2ad92eb91dc062d057562ae32c1436c2ce2fa06af4429
Range Proof
672 bytes (Bulletproof)
Memo
f8cd6222a6cfd27c43d3893466b9cb1d3b0207100067719f9cf19b9674e553dfaf0e66e0711e9f8925792b45d77c2bd83302ef961e2a6a8c80674608f5badb2e224ffd65276e6c2d2843af69fab028fcd0cbb24d7963bc49cc1eeb03d944164e9d29ab64c604cac74ce2dc5d8ba2dce6611e3808b8ca29e2bfce56c1e60d9c71 (encrypted)
Stealth Address
28d8fb7bd5fff427c4e4488bf9d5e05009c66c48dd8cd9fbeb9501aa1ae8b07e
Commitment
5009afd6e51b97bacc28e739b3f9563000dfad842b853f1a5767752e01d60565
Range Proof
672 bytes (Bulletproof)
Memo
ab616e1196d206790e74045855f65207bafe67549ff5a7aebb48a81533c0ec29d01ddbfd30a95778f06e30cb615716d3516f0a460659b025c08268f6e8291a397ada86f48c5fa8e1d4e0c1155ee9933ae80d6390d1e40770bb9bfec80369f1a117d44cc01c822b13eb1231590f9a40f96f0fc4a2f7aaaf65a8b2d0e9fdd044b1 (encrypted)
Stealth Address
0862f361780ed3a738faffdb27f226df074bedf3c90ba9ff47f4d38ba4647548
Commitment
7a6686c64f7ed20cdb5bd518728f24b4fb30d2c008e2f6a919bf1d87fd06cd5b
Range Proof
672 bytes (Bulletproof)
Memo
e711d293261ae402363a2dfd0b160475c96aaad1e0296cb65a7fad1fabf1034c739f9970a1ccf5ae7fab254716ccd8cacd0e5a0d10a9125299ba731bbc73dfbacebcceb2c327eb6b45cbcec4ff0520c9094a4dd21b965a332dae26608a851175281a9a6818b06af4e4ac0c1f795d589a1de92b9b6d5bbfa657cb2a7a5225df9e (encrypted)