# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e861c2fade98ce691ea0cda0e402a1c98539f056e159a2625a0671db3510722d
Pseudo Output
de01c01cb9a91bf62b6dff981014a9a76ee6e64493dd6359ddd5a6afa4d35322
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d0de1f8998a5e797aa8a9c19c0d1229ecac96dbadf8d189957a42cae419fdd78
Commitment
82eed526b9a8e5b6b568ce212af36c79a3c33cb17350b1af8bccb0e1a0888c43
Range Proof
672 bytes (Bulletproof)
Memo
e7fe364527f186f9c3a8c9b98acc90b1073f71f23ce2b27a8b44b2dd5c51fa0070208c2f57bba969f8cfd6806917be32b3d81f3d7f137ae548e87876fd5cd83de7af814259b766f8c5ce89062165bc788a6057050b736e49454e84138e8c57576b825955e81ea1896113d153ce1f93b179b11a0fd22fa39f353efccb5293b75c (encrypted)
Stealth Address
cc2d6b24b7f0ffad81f08a0035c0fc83286313c13c2c4bc5cf035b5d4594d355
Commitment
f27b8785a86757374fc4649e318cfe9298aa9cc5563ae2b737997452607c543f
Range Proof
672 bytes (Bulletproof)
Memo
810d1fa01cca45bc78736d305cb5130bed3ca858e8420ec780136c62bd0bb8c381aaab96bd3f2f51ab64c6e2834997c5039aefae05abb2f865759ac5e1c13b8ea44a2ed612352b5fd698c145970c2f92d2ecae771152f683ad87545a96ade141028aa45d6d378041fcd1958ece3e91dee21f165cb24e2e82d9b4925e9e516e84 (encrypted)
Stealth Address
82f3d31787ad9f01a2ccd1d166d4044b1ac406dfff1cd87e959ddb87bcb2d558
Commitment
8e87c7b13d5d7a111cbb622017c5a737289938c20f3390b867e57c6903b17754
Range Proof
672 bytes (Bulletproof)
Memo
a3e52be8d98e6ce1521610301f92404e3d2b97f029f239f090bd6ee7342ca1987e24f633b8c8fa44bc14ad476e4fb23c102597fce9a64fef6318c8abaf2232cc9b4215d2a2017df4e8b881c5c6de8e937555a8b1d92e8a9cbc1ffa70e69c3a2c489aaa61382694e581d4f92e21409cf9699a99e6e39db33a7639f520157a8b81 (encrypted)