# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e81de610451e391c1f8a334cdb9d1742f07d14092eb135fb97502f8b54874d63
Pseudo Output
2eb7a74162eb7be1fa77fd4f190242a71e85918567d63205645eb3a0c8edbd17
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f8c72fe47a1fcb6c6877e9c972210edd27eab1e2e6f111b6319565e81ebd3569
Commitment
42927dd67e6be20fe845e7f9b809026dabdbaaa9d20b15ab8144d23afb8d9860
Range Proof
672 bytes (Bulletproof)
Memo
7b886e5c07a5f890d1a6fe81aa8dede4568e578065eda52a9c68133143f844bc6aca12c145cd11d6f7609e98a7e1eafd0d7a0354b94be2ae300ddee1e151dff33fef42f89b2c2d8f583c4e9414122a88e8f63c324013e59b961e60543cff52c3d327fd666ea8310f0d56171a29989152d16da56d55f73d2ed52e2b897171d1a0 (encrypted)
Stealth Address
3ac2bb46402f5cbda17201d37c38257bd60a0b7aab995761f7178c5b3ce10267
Commitment
d0d1d78f3ff61c39ea25bef16c351ec87fa516432532d303c8abff593c5a795d
Range Proof
672 bytes (Bulletproof)
Memo
1ab53976a34c24145ed5e019f00d2fe45e39b8055ad995bfb1fb3770fc2864f9fafa685faa29eb15628d9a4f198484d56657e9505222af532e980173da9675a0fdceffc13cc0d8ae5b17808151200b5fcb7ccee6b6752ddd3ff594498ac684bb0f82be4ea825a964780645744242146993af14283e6be56b1fd6067ec44d8dd6 (encrypted)
Stealth Address
a6d1cf9bc23ae008e17668163d8f25464c026b4e11c3e1f39fa1091850860f07
Commitment
b2637959c8a4b3d7c7bf41518bafbd5fd98089df553a6e24eaed3a6f4954ea3a
Range Proof
672 bytes (Bulletproof)
Memo
59f49dbf8c15b3138c8286f5493ec6806842b269c12ec1a40aab1cc6c1b48056da99b7c9f478caab19f2e6c2d067d387ab59f032b54031109492f77743dcaa00dab5660f72ab62286c4148873642e0f4affacaa72c26dc5933647e3cd6ff70a68a65007c234b7da47b1e2658b94a601f7d84f6bb8da9d6d2d70826e18404e563 (encrypted)