# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
78954a725a9b1c542cff8a5136e7c7c4379f0e1b3975c735a3b805ff308d2b0d
Pseudo Output
4ac5120823ece6ffd99bcec436804d216fbabb7057d9f206f1215e47fc57494d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
048eb8b7fa61a3cfcb0d9de02a764e5edf99bb83580a45c92819473267b5080a
Commitment
e67cc1942812abf056d88f85c7f3decac450f0bf90a5b89abbf8775a43b41108
Range Proof
672 bytes (Bulletproof)
Memo
c8f876c90672944d87b58af3bc3e4704c95cf6452cc6b9eaccc84406fa3fd0473b940efe7e0ff32a9d3863883400e7c6753c45a4e3fadd8dd1702bee1e5d38e1c1fbe290b6bc98c0f91d166780d566f073103367d0228de98aa5aca78eb19dc77f36f84fd349d1d65fa9d44c57f3a4beb34e45f32285c9a1cc7ac9fee60b5451 (encrypted)
Stealth Address
28c4538b51c944cd6d41bf2653619085ff4da827efeef37fb211c160e9d32769
Commitment
9ac25b6a0d270aede85de5c9ff3f904af282a1acf17fe41af934d2dd26b62930
Range Proof
672 bytes (Bulletproof)
Memo
960336f6657b7eae05aaa7bfd839943edb71b28e82803846e6cf803f8add6ec6734813ce4549918ee829e7264fb27a5326511c4737f24fd149f57bbb98e3e291f814097a4aad6abb9855210175e1df6ae01091232b0cf7681646333ccf88cad1cb6c873ba28ea5a70c715530d6254da6e2657f0bababacb858a014cfd789b27f (encrypted)
Stealth Address
6cb6c10daa02714124cc2b3cc64124b0f146049c87d5e8bf660cbbf465a9df79
Commitment
ba37c7c27fb161915b761a0ae56bd1a103bf9e9bd4498ebca5e08db379255d4d
Range Proof
672 bytes (Bulletproof)
Memo
cfd6840a893c61667ee3c299a4536b907b90f5efef2076f235c5d74269db27dabd03f2a194572363daac33d9c681774a6f850e00a410b6d278cdc271f66dc0a56a180844d16a265a327536ef83a8348cd3badd9af1268ee1a22b8857e8ee9a3048e2ee9cdba429984e7e015c54fc2470843dce4f53ef5b763152556cf1550855 (encrypted)