# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e8fd95072a4b2a43be9ec2a35b6976609f09ceecce548cfc1430d682e6c54627
Pseudo Output
6c5ac9d92f5ab020696bc36399c457c12949d9b44a3b780ef72789a28c8da700
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e1a7a8117eca5926230cfccb4a8b572fb362857a6d5eb8f63068b2db3ad6a4a
Commitment
b4ff6a749fe9d0c75f80e142ac09ddf2fd6680b2ad76005937af9be4431e8060
Range Proof
672 bytes (Bulletproof)
Memo
1e5dbfc6347ff32d415151a9ac821797dea3048a15f04fbd0859e5873c7d3e290282383d06f0737b3f08d83b6a9a553e93b6145026454b180768d75b0cf7744c2f3943925718f2ce9792b5715ed2403c8730417719763fe2554ba29f60294aec150576aff6643b2b1a38da45de9b54e7b87a831f02755a014dc377d397a8791c (encrypted)
Stealth Address
feb83e94a3d88119bd8dd8666c0693825610a95ac6b89e2b8a80a5876fe03378
Commitment
b222fbafae943fac8d17eabac55ce3ca558a2b498e9de6c37f65e4928364684f
Range Proof
672 bytes (Bulletproof)
Memo
d614b47a4b497f0f51b6007b4af235312a6958004678c722a8c048e213c39a4b12fa5a4004c59b2239b1f80da6c2ff2504bd28c182a20c8b73403054e25aad1b71bb73bed5d718c913c5ba939438bbe1196816dc6aa2d0072314b806443cd4dc9ac42783e207c6ef659b609774fa323264cdbb959ada17aded1d85e8627e1be5 (encrypted)
Stealth Address
5a0290cabb9c3cbba2aa6a5686e8f296bd0e7933f6d57809305d12c12986da60
Commitment
186d855e35db9f27b5fd87ac614906616cc92e5c38f53cfe8a2e460c5e370f36
Range Proof
672 bytes (Bulletproof)
Memo
9c29245890ca264fb6d38c9f0a0ce61aba993cc7d3ea5110394a8b8d07518c0983515ea9e7fa26cfca23828b5164bc1b94e2c79de73932572efe69662c45079bc972810d1b9bd98ae11ee0e9ebca6b2d1eb4e00afcdf04e54943a6b66b00ad2243200ae3e588a2c74c60dc044808da40896cb345c1b9b07c98c46fafcd81da84 (encrypted)