# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00a702723e5c96e046248eefc4e7dc6fad638dac70c10551445eb2acd176805e
Pseudo Output
ec7ca7e57fb8d35db496c3f8944632f7056a406b0ff3767d02812d1f57c1ba7f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82b02af7bfcc0c7eb290c28106dbe35a02cea4d38dea0be0956dbcf48180823c
Commitment
764389e069531a46168f7fa610b1f773ba0c7ce85978d2212a6f280df594a37e
Range Proof
672 bytes (Bulletproof)
Memo
451b3d03e84dfbb0ffed7c3d85a4d16778a567a0441ea253fd6bea3ea6fad5a9d855e4fb1b96a0d6829cc5fd79389d9316e027cfeed611021d8fab17078869cd428c503c0c6bd87c246e5bfd642b63a33c5269aee5178ca0ce2c84fab078f239feb41fa421b73eae69d46701b6e22c3443b4bb78377c6fa226c0463cbe4c67f0 (encrypted)
Stealth Address
686a257a58b6cf7f522fc7d5c1614a50a029580a4cd2a21313cbd1d1fe5ccd73
Commitment
36ba240e69ba1355f04a88b49da849caf6309b444286a900badad67f3566d655
Range Proof
672 bytes (Bulletproof)
Memo
7dac453bc6281b107fbebcd1a476998cd96b333d6ec80e26e9cfdd9b580a2018aa775e7e50d1d317dadc07253b3cc1f1ef351b0e06399b12eb43a8a5a3d97002fe39fe0a8f68bf596d9ba4b97be914b3de78123be4f4a324e1b0bab3b1a9d7b06739833b85376c972f1d4c4321e4991c6e3dd1c93078323aa232fced310f4d1d (encrypted)
Stealth Address
501f03348ed25a292746c9f19d0e097d013b260fdbf2f35dedba86d00443a050
Commitment
1ebb530af76bc0b921653abfd9d9c94d68c72f76f1fdec78d9498c2fa78ef969
Range Proof
672 bytes (Bulletproof)
Memo
32536e771d2eb268c4ee31e7668c5d356dd5cb222e8674074be6d16da3bab8d3b9505a565472b634b1fb60544e60713bc862b2c4459503351c2cdb4058ffce2c9da91ea45e8c49153e089d34962f696841f03d1383ad4f865331a72890d69ccf97c25549ee5aa69d12f6bd158f0e897db958647c661fae10d7be14d54232e059 (encrypted)