# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4401c04ccc3b9fe0e2e3fdf7507ff1b303115d1d040923c9ad3bd6e08614f3f
Pseudo Output
64af64a9e2e9a5949f50f5b38ef980455a057798e765a08dc99c6f5f5391795d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a405e8748d17fcdfaf41daaf515cb28c89a0d60e449c407df91a7024746f192f
Commitment
c234ed9db6aa6a0bffb80a434e493df86d46f1b7f0ea2a22c9c1e28021144f1d
Range Proof
672 bytes (Bulletproof)
Memo
e4d7998d3ca85ec567c4ef60c010968ea5d857b45fccc3a644e34033154b84d22856688226fe7752588daf5ac56becde038cab15a6918dc8c111daf32145ef3589934b638484b0f540ad3835eb1035d29210458c2396f2b691e58057286566baadfa6b526f4d302d5367fb4d63f39b3025493888b39a7151f125b3d24f25ef2d (encrypted)
Stealth Address
b0c1ede7fb2c9a46641f9e9c2609d3284fdbaa4b6167163e71f3c60b723d4c44
Commitment
d8b213ddb4ab45e1a642e943845502b5977ba86d15b0b748d6ed773482b1584f
Range Proof
672 bytes (Bulletproof)
Memo
22e21328b075e2bc237cf5361a35bde99f050cd574d986035c2eb0f76bd5e7ca57933426675e7919bb83fdb0ed9f305e35498c8deec802ea020fffff062cfb7425755422511c9979308718681d6416dff8ea915dde73caccf7ca89ec35b9ea88de7f8341ddca13b79f3706fd63e08bdde80b437e69f0cc9176bed2f0abd5ebd6 (encrypted)
Stealth Address
4e8c8947a9f237bba120cb6f5f0094d39ff6934fd9dab89244bb3f4699205203
Commitment
34ca87e214c20a78d776d14d903274cc52ebd30ab022b62b3139018cf7c8ae01
Range Proof
672 bytes (Bulletproof)
Memo
8e68e1fe8e4d974fbe1d90991d2d00245c36d1a72ef5c79c9025c5a03ff6947dda8857efed6f11b77c9e292a0be6d6bced453232e3a0d1f832fe2d02e0cdd5deda8645ff3762dfe3340c8f0266d76576ad305d04f49071698fc215a7755d889bb845c2168e5d60d06f286c722b61fb01a8eea3afc63fad8425ca493ab06e228d (encrypted)