# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f00f421177ef61fd29825ef7935868bb75d18f571f2ab5a82aba38db68671f35
Pseudo Output
e0b09ec8f10335f6bbf186c840314d3cfd8cbf92a8addb46d5a781aa90c94835
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8bcdb13e33002ca4a342580fce51f46a56400d571731dd7df398fe9ca4a2f7c
Commitment
00d9f9dc48f49faf43639e049311ed2384269d9151cc9fae147440343e0cb37d
Range Proof
672 bytes (Bulletproof)
Memo
ad4544804a2a8c4acbc32e39465447564117489c2c40714af20f6cbf0a1ebe7e68649afcecd1862709f41d5f9e616e52d372b80123d321c8aa3057a91d46dfb7c930952b458a30107315247fc5dc28b5aeec7cac3ba2f4e303d180636a574e0580b5cab078b481c3d3369584501630be964c6bff090eb14764ff1089499ad698 (encrypted)
Stealth Address
ea577677d899c52b75ace37ff27dd2a7b56f459e5b4778c9d970878396652d5e
Commitment
42a31b042c06862d8fea0f3dc7df481a351b1108753c935e0201c19efad78529
Range Proof
672 bytes (Bulletproof)
Memo
90a9b70b51476044b80ac01c9edd30981f78c9bfac876f958955515b247027876c52862fae264cde32c6f8f251779303a7cd240e91c0e3b3975bd62b9486fb756092f85906d8384acc4529e792a0417d42636bae35574927e93d15ff251a7976ebdbf37dcb6889a59ae7e4b4900eda0284dda137d6259629f0be2f110d212e1d (encrypted)
Stealth Address
a69b89038c14595aa235cc902a0edeeee098fc82f961a428f5867540c219ef5f
Commitment
10d04f4cd835c6f26ad495da41ea433793ad90b9705e56a80a6703de320e577c
Range Proof
672 bytes (Bulletproof)
Memo
46eb91c449a1c889436c7f2b26e6fb3f3f1c987aeb674874d9581d3a935c7127207b7ca6138c84df917236e0a7ec592748e63b8065bbc6c73ed6948bbca28c9acbda61dc784a383eb9315960506b8018be45201a4cb1c5768191e713d5922d81f3c6bb6c1fca5231f02bee1b94ccd9c5b2e18531f4cdbaa19b77f79b5cb19384 (encrypted)