# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
56e1401f9adf2051741ad2ee6fd4c69f31aa30679f64d6f74259b2c2c912b659
Pseudo Output
6818f9ba6f3e89dc07ea30ab10749b81e8691008423e5916ee65d2197dd82b37
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f03dba3d479639cd79103976f9e8ce2df99016708665d6b4b0608cfe9dda7b6c
Commitment
f8474a730b9b921393e919f52ac3c5540266a2bb32f0c2ad2ea23ab904532b4b
Range Proof
672 bytes (Bulletproof)
Memo
1d09f4be10a11142bcc208687dd99eda487545414798697124bdff60d89e98b2aa4cb73887de0222c3605b34c4951fb7a5bd57a842637a463fc205fb0a6c2d8ba7e6844cc4ad5820b68ee25603c3cac5c2c48e0ab15eb43fc7eae22b80613c5ed61749d138e41f403be4cb01ec31d55f2a8a5a444e66bf258e06e9302f31e866 (encrypted)
Stealth Address
783ce8b2ae3923f8759cd533bca70924ba35eee0afcdd91365de283461a98f34
Commitment
3cb8fe81c136375805b053e34e024430d1a9de5ff2b2090bd17dabe3208da26b
Range Proof
672 bytes (Bulletproof)
Memo
751e15706724a2ce53b20b772ae71d48e9c90ec6afebbe24956fb388ecdeb033502e20ae95ad5a7a228841e5c1c6f6681f80a00c23bed621e5d3e0191f0359febe7c14eb44335ba5ae6f14f10dba8f2e792084d1425fd66746489be60f4258c705024a63e012342c2e65ce7af6e39759283b6295cb211bda328ec29801644637 (encrypted)
Stealth Address
e4e0df03259ab1ff745c26601d42b8d586ea4427fff7b6099dbb3b98e15f2e67
Commitment
30ce0807ba78901084dea0c5fdb9e03f48669654c2d5a8f8055a6ae5a93f584e
Range Proof
672 bytes (Bulletproof)
Memo
0109442fe0b53b0b9831bee3973c01a59a9945b03ae5ca0f0ec97f79b9287b2ac8f58fa519c18937f03f808f0cd23fd991acdf3d73cff56be9f3e649c9f4022eae8bd47cd4c6f02094548b3a7d2cdb8d358cdad7f0b5a2b385da71ff4055c32b1932ac18060de7b72c8880368aa40ed2f2dd6272f95d7fd5c409a535c85a2428 (encrypted)