# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da1ef6e716d8e67ec22d398e0e823c33c2a0947e832f369cfa0a32763293b36c
Pseudo Output
f612a055df54cb83b62363125744d20e7e56ef9a57e349b5e17c1100cddd6c47
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e0d17cb7702a60e9b1b929c8131f6c8eae6fcbdb968a8498790ed6598228728
Commitment
18354e504c75bea92976761c4c4883c732157437e39d7f92f7179e8ab5d5813e
Range Proof
672 bytes (Bulletproof)
Memo
b85afd9e4a6471f5b166b7096c7700d6fb8166356aaea7857356b864744e589fab3f0bddb3fdb9d88c83f2bd1d5aba553c8fa95cfbe5b2d9a2834ed919b79efb74f7b2624a5cab763948a46df4d23fd8248084d5658e7626589f1da8a90b0dbc90e567e4c49676eaadf81ffa7af80104f074a6c5208f040af29c22a7c629649d (encrypted)
Stealth Address
0a20b93932e39b503f2d49cb73b456d8737d082ff2047ad08aaee1d385a5ca39
Commitment
7e1e0577dee3692fa5362d7780626917efbb7dd4adc3a41cd277344013571516
Range Proof
672 bytes (Bulletproof)
Memo
9e04e6c6ca5a5318a5254a50f6caf39b40387c19b378078c7bea0619881bcc09d7eb51019f5f81acf0ef1c798c35cece6952acb47927875c6192e808f726e89024e52ed503b9760dcb66b324d7bcb7786ecbaf6d3cf5c4eb7b635411349423bfd55bde92a25131466779662555d8c333fce9c4cfa8172ff101a5d3a697ef44b4 (encrypted)
Stealth Address
002df577f0b6f8974d581d6122e66643b2c90881ca0a55f4740db8fdd7664026
Commitment
eee30f8968dd75dff99143c3be06db5f42760e1cda2c2844d8ceb5c6908ffd46
Range Proof
672 bytes (Bulletproof)
Memo
7c2b31fc561bdce03850fda4e3d28a33a17e3fa3d2d6b80f8fa11d3713ef450531116b7fe6d28f0281a4b5921c374c62e6292723fd5358eaef29e6c93903ae2511142d1c0d37aaa56e6087b6f6bc0d08514c4a311de754624ac7c8343ba2a513740b19e4f21852a2de6968e9b5ab61a4e44b5ea437d9f24a773d042849f4b5c7 (encrypted)