# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
620913d5a01615cf278070dcc0c1c191c95c7841b275f5f713232a7fe3f57716
Pseudo Output
ea79b31549eb86f31beea52f7d5a944ff67706026bc95427739055925e44cb51
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7ce76afe5bbdfd60d0f9bcc1ec12fb65133b7fb5e010567dfff9a23c62b34d28
Commitment
da7cdf316d615401b8c2f5a4e816ee3fa04ae81fa6a0f0c39afd009e4b4dce77
Range Proof
672 bytes (Bulletproof)
Memo
efbfb6950a6977a22069ad6a88bc070da8a92fd1244af794c34b4fb76c044d1d21c823b51ea13492b41895a0cc15bffb07359c9b5cd8f1181ea7ea2cdcfc59340017d5fe18123282aecc811b5c1814e311212d4ac4edc1cb50e28f0f2d7bceea5e1b93bd1a92848eb70170978a52e4795a65b4d581764cf7695c95443446ed38 (encrypted)
Stealth Address
ec2e90f39d4bc9b8241fe9fedbe2425c81cefe63877410e8c14f37136c50695d
Commitment
c474157b112f6c4998c7653b43c65e996cf9ee08278a83c5f9053f7edad9ea19
Range Proof
672 bytes (Bulletproof)
Memo
bf322cc032523f156b532d7d6e46899a32b893a5be1774ae58e112e87c680153745263ac99de8e4818795d47080527f35e24512964f919747806d95f547d4b449795ab850df85054578ab41279328875e8bad517a778632d5fa955c25cbdc8399c8efae47a2f303ebfc9632ce321d9b62a125de28f40b17b81b734e2a4c16555 (encrypted)
Stealth Address
68b6d4af2c742f84930a5038f6f1da74c11023a05f5354d87eefd023f3128b28
Commitment
584daeb45465a70e958ae9000bde65828b5f268319981cb92881cf90b855d21c
Range Proof
672 bytes (Bulletproof)
Memo
e2d0a505f9f7871f0f910b3354483cb1d10c4a5884245d2702e139da4e65aa809e1b7a8c0611f611dc906b68275ac7f2219e069d37da95acd1e753e30fe46b6243006835419b636648bda52a2314867320254f9f80a9bca366b0fc975401516fbbafb6703cb8c035ef5ef87d91e67ea8ea63c894745722e5329596b4208e04c9 (encrypted)