# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b818bcef09208848d0b8c5b19128c09254e981941a451947016394f836ae184f
Pseudo Output
001090563b795e9ede4b2dd0b02f7c518c060a83ccaab695e9b04b3b92561475
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3082a5c6562cd2320ceb0e99f81f20ac6e26f2f85a45d291459877480ae85239
Commitment
00c6afb4ea695731da68de16b2460774320b8777fa30f04da9640940b1514a07
Range Proof
672 bytes (Bulletproof)
Memo
8d507a7a218c41d31accae57050d262f5133579493e9db9b27153da60fc94073aa8dae85ffc68d67b287f523ad78a4a5b476feb786b6d100070318cff87689eeccd6bac50f87c7e66e7484e3de7ef6e66962e54a3533917de6c77507c15ec4d87e5e4a99ade6bfbdf1fb3c0334d00fe2b740671d89b6cdfef3f5ccb117ac8423 (encrypted)
Stealth Address
0ae0e681dc80398a757d294e52a4d20f50866e4dd91b0fed8c8cae2746aedb51
Commitment
ec53be05ff4de5b00bfb3e290e1ba34a57ad7a3317841b5e1865cb2572f9521f
Range Proof
672 bytes (Bulletproof)
Memo
e4fa8c0b07b4d30aa2ff30e94fd1addff11fba64a68419e9306ed73857c79712b9c42cf71346834f4fb2d191b8fe2c219de1bf6a9b3532beea198ef06bacd4362a6553298da8e03c2028fb6da17296b57ce723eb90bd2cb2423f0559169452c4a72ee2dd98d00da34bd68d2322a3792e2902cd727efb1a927398972555e28199 (encrypted)
Stealth Address
fa710b9412edcef278351c624510d30a6f2e5be30eb51a99517b5df8d431e852
Commitment
643f9fda66bb142b36502631b493a6a90041e4bbd2dff8315af79e21d119f441
Range Proof
672 bytes (Bulletproof)
Memo
baccb9cb725c2c75accf2c105034e9f9b3ed58865e3dced8c95edeee62b57f0a83cf6805b7089271e136334c9ce10fb0d74c7bc88a6005cfcbeab07e25b3b4fc0b3dc433237ca14548687e521e0df088af469bfd613ccc328b4c00a0d515a6625a877e357e46671f79932807c0512296fc1cdde14bda1e3e46520ef9bbabdeea (encrypted)