# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a676d108073e7b69e245ab3517b6609a34d82fda3f1c2aef05d484c0bc5c9056
Pseudo Output
f0daa32ea60f3e18957143fc140cf1cf2ca31f36a0b68e3d9898bfae961f5c62
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5abcb50e68cc372210d97bd2f79373b8bdbb3af58616cdc12bf57f6a9c61105a
Commitment
065bbf97c50dfd7d387336ee8230bd40c662d0b07a3a99c27edbb1f85ccd0b01
Range Proof
672 bytes (Bulletproof)
Memo
69527857f9228f03d651f7cfeda2a5b29208d50191020e1aa4c4532715c912945ae0f31f623d6f56ef2659b4c11d7cca5b640f5eba250bf19d01f6f1de320ee5a835cc32357fad1b63763cee7bd2471af6306b594c6e8f7f0b08459ffc2e62afc1ad77b65a2d5263fb236d591cd3b4f871c19878801514791efd852428856b13 (encrypted)
Stealth Address
2e660cbc6b4ef4a3fa57290b5d77b229b3e053a591791f9477d9c2aafeb8092f
Commitment
28b68740a80a580f1dd0538969c803bd0cfb36bfc8eb55595edab7712147b741
Range Proof
672 bytes (Bulletproof)
Memo
46919ad1b327381fe3f9d0af32baf2a49fc0d4c03077b6c7e0ae440c261f4374e585da9cc967597ccb7a3d5b9eb5767d4029d232aad6f74fb101b04d0ac8c063f644586f562b920131d8e6eea16778a1b3d5b232f6d6b56f91a217506ef6518509f84a0f3b44a44fd7ef1ce494cafdbe6eb3a2b5aaabe46dc10c393bf1d6c9ca (encrypted)
Stealth Address
b8f101e2fe16df5ee08c370b5afb7c225c360e5ef2360af80652532b902ef027
Commitment
386f082f258177007e3dbc73d181cb22c944571555fff4c0d1cb31afdd39e958
Range Proof
672 bytes (Bulletproof)
Memo
7ff0f8f31051c65819cfd025a8c88bf3a9133839cfaf237a1ad5bf1d9344d42735e350d75abb296604e37a699db521646896da1d9bc1c02d5c225347ae5a043dd95d83f67646b60c02b8cbdf8fd4899bb461ed1140f08ce833c1825566296341d5fce8431f5b174722ef01445128b711793bf59e0e34e31d7806b3140295ab83 (encrypted)