# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8849a765ca6b535097abf158e4e10409f50fa64fabe37c7ed0d69472ac94b728
Pseudo Output
1a7d50ba56b7deb22c7ee92256c83f3837ead2361ec3a3ef6c6f60b243825b64
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e8368fe2e8821dbc640681038f379edf9aca59fe0778846a30f3223c32bcb675
Commitment
3ce24ab1499f88bdef15e6369e62c4ef27fb7ac2309d06469d5ba8aec9bf1234
Range Proof
672 bytes (Bulletproof)
Memo
a0cfe2233c4c68beae45a127fd7490458596dede1ece30d7b68056fb8a7764677a6fc29c90ddc4dda7e98364d62764a3beb602591fb480422cd3344829fecd18504898db7fce6663060baeaa1efed8ee76cb3da02022d28037652e990cb2feb1c4a4d4eda7ee02840c721e9dc305bdd76f9dd286e81db1b29c930993416f0aea (encrypted)
Stealth Address
0cd525cbce63850beef6db593091a2e55a4d5be1617be541522c0dff863cd266
Commitment
c6bebc110dbb1570f8546ee01514113d8b99db8e0ab31073570768916e440a42
Range Proof
672 bytes (Bulletproof)
Memo
a12a14a87ca0c5914864b6d6170aa20a033b44fb36dfb9b515029296625a6ba7e93d0a73e70ab48fa665781bafe9ed47ceb7c9256a1b115b45095263bff25200b5af022ae30e01e999abd2ce2c4142f90b918f0f7b4572ae19a454bc6425d040855c72391ea297da2ded65c8a68ec002111ec90e088eb93ca55b9c0ee0adfa04 (encrypted)
Stealth Address
5e02c6a13398068496ceb73d9452dfb69550bb7d1a483b909674b607603c5e54
Commitment
d6897b7600dc29705e9c2da30cee5312ae7b224f164a9317e7328607e690bc47
Range Proof
672 bytes (Bulletproof)
Memo
f08d73e25ece8e5535c485c6cd067a7884a2c427d79c3715030550516e9fe6a9f7ae9cd2bb5143e4ebfff250a8cd686f5746678dc85185b304e3a67085b431cea96290bf0e1554b23f94d6fd72e362a1f556e059e011e5dd09ff239c03c275885080e85a572940fcccfe946126113a3a47f91188e69d4d93a5741ba046f08aa3 (encrypted)