# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8eb51144f8b54de03712aa8daeef45da759e43e1231555337f176ec27415307f
Pseudo Output
1e757fbfb0ea4681a1eda34917b5d9dc33bbdc442095aeb64f9a9a425e579c5b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f258335330a92ca6487427fd9209d32cf347725f48d5fb0d759de22a41f65926
Commitment
ccc7e32c12d2ab082d4149bdbabeb41e7d80e014dd2f09762b39f5b9d15c1a26
Range Proof
672 bytes (Bulletproof)
Memo
7cb82008b27a079376a4931cda4c7047771610fade2dfd163ee8b3427360b478d570b0c7fedead398d802801f3c03fd58edcacaf599b354631754c81cc15c8ecd0eee7c44857849ffc70c9976813760c8b0585133fae8ecd18887892a5e315f2c3e5259783766cb218da59c3b0afce18596167e9207f17ade0e7382c01ed1a4b (encrypted)
Stealth Address
8212dd38ccd93d3e6ed9ab0abd3ad848336199f2e93427959f9aae9a5e989557
Commitment
14b2dd88e42a047b95545f1dea8117b2c5cef808fb3795a13ebedd057dea1b5c
Range Proof
672 bytes (Bulletproof)
Memo
0fb57b860de41cf058811864e9693a616afaa256a0925d4405a6b01ddab159d979f99a34b36792c33fbdfb085eee8fd9b048ab5f11e3c800d404cd5b2595808829dd351760d2f485797f0b73110a85d17c8fc0e3ae06679e8cf3b4acade748169f255cf40e79ee7c89465fdf3433d02b4958d7245996a02aa2e1cef719248b67 (encrypted)
Stealth Address
8c81b1c44c1c7cfb4aa93a864d5f6051e7892f04c4cefb4d6804cc1b1b6b067f
Commitment
e614f92451cbecea9985d99adc1bc101af5edbd8cc598e814449cf4e7d61a95b
Range Proof
672 bytes (Bulletproof)
Memo
06e911951e74bd59101a9880182f9c349f84383aa50c71f4066563029657a11ab1c237a25ff3371b3a2aa46c1b1e5f5ab518fcb847a4de939bb03107e74dc9a7583f7798de8a9a8ff29015cb593cffe6adabee170c9344eb1ec66bd52f8a895bf10349ad4d12311fea7806384384e55c227ce3ec65b31d5638c65a534bc571e0 (encrypted)