# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
345c48a95b6059a6464e4b8513b4914d18759c2df8b1d070fafd283d1817921e
Pseudo Output
5ca0106ad8550e04368770143b44746d27e96d858029196f5bc2cf4f8f401246
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6e9defc91d9bf6b044350cb429cfac52d399a086703c4fdcbf65391e5f98741f
Commitment
8af32672bdad24a408ccf8ba6c5cc4c06ca3c066487dc92120e3198b16329e1c
Range Proof
672 bytes (Bulletproof)
Memo
0d308d8ffb372b27cbed1643dd216fca020e76418b4a8e2e10481f222c62f8107f75b7d6a663d33ba49d5dd26c002162603af852aec10327fb1c59a8fc9d8fa9087018d337621e6888b1f0c61d3901623e632a4565b8b6d9afcabde64ba48511d259d9deb9ba1953c831c74172cc71d857ae7d8f32b9f458ca802b8abc82335d (encrypted)
Stealth Address
0ae50be37bc1d25195fa690584b0d3cfa5ffc005f4c04242f0be62a7011c0448
Commitment
ec147136c2ec3e79c947e115502fe76782956bb73cc8dcc7be0c2df77b8a9638
Range Proof
672 bytes (Bulletproof)
Memo
f9fa7ee958dd601dd318da0e985727824f986d62b78208060ab906dd003fd9bfbc24159bdc38707b3cc769ad86288b8f3b388ec9be1a78142867279e103426560235dddbc1773b14fd532e1420aa36548629254a02f45805af4b04b7e6002603e9f5ad25445487f0d996083b63acd2080e37042f4538b9ee66f90fc69a9f1b35 (encrypted)
Stealth Address
6e7f21de1b7e800cdbb32cc5b5992bd9d325550f8e38a4a2826b1bcff9a40f6a
Commitment
62317b6333886d31e9e30f7d5a0ceb9e7d5eea52df1e843b752e65ed8b697605
Range Proof
672 bytes (Bulletproof)
Memo
af5017ffa8fda2d60b92f793092e1d1a67ec6aa414dc07a5640f2ce08178079aba524ba5545476e75b3b6b0d4fe1243cdc3c5470840b8b7db1ffde2036e0285e77d31184b025f572df3cd0c37811b466b79d3050b8f6d7e01fb7108c7de071741236bc6f88a882be330e8144ca908740ed83034b5780fcea89c0b30e17b71242 (encrypted)