# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
901c582361b9d7d5c1e14f71b495e7b5ecfa3a90f6cd30cd6a5f40ad2deb0744
Pseudo Output
16e590109e1afcebf93faf140ebdfb2a42ac5124f5175b9bd5cd9101d9a3f849
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
da6087d925ce924091346cbcea7dc59d6fd24d502bde594a172b00fbc5f90474
Commitment
0ea7f22c1e14d418a11141b794988c36129c69eec121a4f9f2bbb4c2847cff71
Range Proof
672 bytes (Bulletproof)
Memo
08eca050511f799280537f9eb416949808f569f4b3925378fec312151bfb3fc6ff7f8b2fdf67f56b566936321f816c06bb9e1925782d07e0e77086321efc13ce8b0e6884eefe87682467e15268f9bfced80eb22e3d4358665f98d88b2003d00ab2df17fb02924e6431cb680a5586077b5b4bb96d0707f90335781e68ad229dcd (encrypted)
Stealth Address
4675d1452c08ace54c1f597c8b44711ff001d546fd50a095fe5041dd9096b662
Commitment
367e488c4b788235fbe8c356f10f882996fe825d634566e1eb9982dd84f08d63
Range Proof
672 bytes (Bulletproof)
Memo
e334ce06ff4bc870d7b70c92bc198a11aba443d2b0124440797587ea1d0d78fd18ae3386a044e0035e555ab8905ba09f856eec700cbf8c7ca20c77cd9f4764072e1af767259c58f5d5d983350f2326fed42e5f555bed3c640702d20bae17b4c2178edab045bf6ac77fb50c379a916f663a294dae28348be0833ba5bbe68b0401 (encrypted)
Stealth Address
26c10802ad0eb56e12d4ce9d13e125fc860e4e8b8b00699006b35f578171c60d
Commitment
548451b92516ccb92a04f5319e99c2b76d3c8bdb21593a369cacbb272199fd72
Range Proof
672 bytes (Bulletproof)
Memo
1868bf5e64ee3601ddae12da0bca549f2462e638e864debef4efa9be7531406ce0d529967b924e8c5cce0dacd2ad23e3d8a34effbc4e45b7cf7e41664bee007fbac4754cae8372160308f29a2b70757b2d3007ad0eb16dd2bb84b68830354ec7d6e560cc2dfa320de30c368168f9d2264a75ec26dbda7ae41bf4781cba6a74ad (encrypted)