# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
18f2adc2ef77d3f2b575880176c077ee014a893e9a400eb82fad7f97f805287c
Pseudo Output
e887e919eb8b619c052d832fa8e4e2a73f9d67583d81215979876a47ef718144
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7ec90693356ecc08c80dddd399b32f3a434ef13ebf39aca3f8316ed6bae1bc2e
Commitment
1879c98aa428c262fb5d2fa11e9e68be4f7b7b29d4f22e4d18e4611700eeea7e
Range Proof
672 bytes (Bulletproof)
Memo
25ee9c8c4148949bdc42e5749f56153bb027499d1e1aa88ed68b78de63d02c4fba59c6f79db6ab4a0f9b84004873def331ed10baddad5f8f74229200612ea0d71484e5f03f5ccc9028897c0d2f79d5d4683ee02f324790edf66ed079b43eeab5044956df2ca768a978786ef41039abaef7ceb3154c1f1cae40c2d794221876dd (encrypted)
Stealth Address
8ce314a0bafc17f90ff4cc0f10edbc5c2ad93d0282533c96765dbbdba18e4f45
Commitment
a0781284085206a7c5969b0e7707f113856c8cc27082ec3607202bb86e9d7763
Range Proof
672 bytes (Bulletproof)
Memo
d11284e196dcbf39fb208b0d3d457fe706744ebea8cd52313348b1e0f9fb29742c2ef628933b8ee9ff64ed22603e7928fb76f5936d4f4d5279677081a16a1617b9ef42e6f29663ba71c936a5b696ade03278f731b767154ca51ca2abf89048fbe843d3ebea15a694faf0b37abbf90cbebf93829fbab46327a75a7a5e3d89b387 (encrypted)
Stealth Address
c6ea2f230decaf6bfecf3e50b013aafa0a6ff1e8e7f49649966e3f9161a0620e
Commitment
b44956804c42b10cb960d61354d1463456c6e6f4f2e7d3a2028a87bffd375e57
Range Proof
672 bytes (Bulletproof)
Memo
051f48caf97a368b3148355b85d00df329c39522aeea8191e8256d66e8182783c248aad7251b48a7863bdef777114850a1acf8811d39f7c045e0a81430673e9362128a8debd3d759f509d7fcdc3b3b393b6db5d057912692e35e8ff03e21769ed98d7c80adfc2f031fea3c79225cd340d03cb1535e522a214ecea87a2d0dd6b6 (encrypted)