# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a060025148f761a2669c332ee10fdbd6339a205a8bb1c7c3659b0f66998ebc7c
Pseudo Output
e872d99aee2d54ebdad519585416a52acbf806a054f375882295dfe05f9da514
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
603b1234f3deeab6d65a36f56de4aa5a0d1561e8cc5ab07ce38c1f53ff03d91f
Commitment
e456ef652269ff12858d4ac1d97671b692fd1d643e02dc6d84a997ae8fe29515
Range Proof
672 bytes (Bulletproof)
Memo
41d10701dff3c683157b9e2c9308c156fa9836752aacbc81f22878bc0141887b556c19de526a3668a46f4b87e9eb985dd3ac7583c54d430b10fdba2522ae24ad08aa75a5b816f3b66924fe3db99fe3dfd8d8a5fbc1086ff2e47c013f58aa64035cf2af76b2dddfc7a17c834617a16688815170a2731d1f71119d049398cf391f (encrypted)
Stealth Address
e8f960b171eaa2e670e6d5a61f66f45fd7fa2238a6767dbcdf450d89f41e5c38
Commitment
fa74eb049a66534b217f1373e15243ab803e016a8d8163267667b21705346d70
Range Proof
672 bytes (Bulletproof)
Memo
a882c0d2e61133f0c9288f55bd9525ac59379b97138fa8dfc140e6973e6e5695edbec48c1d29d0ef7261b4441f37c189fb7e9ac01376610cf658ad9670d25ae6fd720d5174d668c3c549baea7fbe9030b5c52223df63f9a71f4b3d2247d7296532cbee932cf272a09ac3e0e572cf8fb299c3a3c11e1ecfdfde080a40c3333fb3 (encrypted)
Stealth Address
c0d0310542d69700d6777ef73797bf75555ff0d42ce4c85aebe556035d3b124b
Commitment
04698aeda65df366ee4ce32d0d3602f98ca8c2b5de1924706fc0441716151f0e
Range Proof
672 bytes (Bulletproof)
Memo
b599a569f3fad993bcdcb811666050f166c1a083f6753fede998b4a5a34e84f66ca69f7a325ea918734c9fa47c67f143016c2b8309d9513d2b4d92b4327de89bf66a6046e7047b885250594ea794acc25eec3f9fd994c5d73a4a0997d3a1564a71be8785db55cd164ec19376605c745e11ea825c8f3d3e8a74a9ed456ae9edc1 (encrypted)