# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1e8d124198feec57c88e61627cd6ca955df2e483278230b2a63b5f2fa4ed1805
Pseudo Output
dc5c390318088d4fe73f13b4536f38ec75b656ee6a07b0dddb7591c69e1e9a5f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
108c1a2d1038df4aaddbfc15dbff055bb026c38d0140e3a6c75a5f2657740f01
Commitment
0439feb9c111aff0cd0c498b1df8eadef96aab0470b4c4a32cbad3ac2d271750
Range Proof
672 bytes (Bulletproof)
Memo
1b53a195bd425a26378529ded6e251a9bc6755fe4d66c253a6f5b87d4331878fa15604fe4275a89cb1ce467bb75bad79416ccd27b24e05d3b95107a584ee3fb7fef7486d97f40dbe2245dc29536ffcda1a34d4b3cd348ca49a1727a8440fbc288393a75d03e178d8655204d15f9354dd8a48ca621222e5cc8c2fb3e635ea20b0 (encrypted)
Stealth Address
387ae0bc65bcc0952badb8a173b72a8e6ba8d71c8fd2bc466733764c42c83d31
Commitment
00e4d9a657c648efde15f04a44e802f1217dd30cf9749caae54e2fa3a2e31f2b
Range Proof
672 bytes (Bulletproof)
Memo
979ad34f9db26e69717896b4f842d722ceb305f10e218427632af86fc4f9a060dd1fc007b0fef24885857a09b25de8a03b05b12ceb7c76004b2073867e7032e9398e05105aa57eac3711cb842e4658161b2c64d24f72945ab14d8c66c993f97cacd4d29d619538d200a1ad837b05374a893cedaabcd1bbd580cdc551b6b9e4e1 (encrypted)
Stealth Address
c0f9f46870454cefdc6eee114d234b0b55eddae3902b9baa721bc3fe64af9661
Commitment
0c0ee4d69c1eea2bce6a3f8e398535447cd527c26b9d7e0ad4e078908cda0b64
Range Proof
672 bytes (Bulletproof)
Memo
dcaecc596bb5a3b3465384a07ff4ffb33c17caba8524dba73557cebdeec767e0d360e8cb5ccdd286882b84f955e60e110e8f62fe4f8ce9c147c19fc192a5ca08ed8f9e28e2c1bafd9ea5f03e98cbbd352af7275f70dc56b52026f29415c589c4bd351b8250f9a07671811553bfe3c01c9b74f7ddc125617b1e3bd0ae2099f9f5 (encrypted)