# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
98bd492533bf326cbe113e59fbbabac385d4223b60ec9fa07f4445139bc9a82b
Pseudo Output
42911d529fbe456ebc7440dcbc9790fff1a86e78740bf474a96c85574b77ac3c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b6f3ef897eb1e892590d6ad1cf16c5a5fd518f8c9159c5bb9ea0365329e9215e
Commitment
f08b7673c86726cfee5a8673a22f8682e7deb5fca2a20c73dbee815fea10e821
Range Proof
672 bytes (Bulletproof)
Memo
3dc9a5d6c6f259363dd1c86c4559eb46ccac1ab283e40102321008e724778c9c5d9be8fcabfab921dd0ad4b5315f5c4c4541502c851dda39ae2445008f944f75d25cd4d2fc614c86271642a72b2059bf9c5325c4a653b32bd451ad6119b1b084161d5a0b1e757078da51eaecd9dae17d416dcad89f6eb2cc7fe1b7a945e85b1d (encrypted)
Stealth Address
a247cb266e048787703abbc5c5793e55843afb82bfabd6f2babb4a6f442d961a
Commitment
880c8d19bc76605d48c11fd431470a10ed85de37c543010a5de034a4b2eb7a6a
Range Proof
672 bytes (Bulletproof)
Memo
8b36f60355abc1698bbf21a8c7e320d8b1228333589bf5105de298cb152a268b16fae0c14169430fee124d7fe362fae737330024de5de68c9245ff85801ac416105d215196c6f09b393b44fd6d2b45093bc29e5199acf93dd9a1720e35af92d0c34fa5a13382e5d7d11eec476c360117ba041eba2cc63bf21c34da7b83af295c (encrypted)
Stealth Address
ca8434f9ea9467c1a8bf593279c4611cd50401a3260ae40ecc394fe0192cd331
Commitment
b8de87b9d4672490e6350c8d58adc3102322f7251be97c1dc6e460cf83da4960
Range Proof
672 bytes (Bulletproof)
Memo
ec01a21f3581b6366c1e507ae7402cb968cd370782ed45f8a983e3d19e9eaf1049a56a01183403689d1fffa6460e4263b6fd590c59cd7df48aa6c976aec1da9bf5949b5cf8216bf5f2ce642bdbe03d897422270b8e347411eb86a3b159472d948c9c34b851ab3c90de0b91d5350a38c0ce285be85afcbf7b6f14f3be714c74e5 (encrypted)