# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e07799d01e84aa98cd1071023e9358322cf01ee1c1d97b6ef76ebd56f7b886e
Pseudo Output
fe5feb53739ca3ef14a51c0296912c365363c78c335d1c90ca48d2aec962857b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e02d382c4ca166b8b26fa0c4a65d22302c421e6744a0ecdeec33476162d3ed7f
Commitment
d4d1adc296105c32060ed4ecbbbfd88c8cb92659305e2e9b42dd1c386e52f357
Range Proof
672 bytes (Bulletproof)
Memo
60be50228e4c5267abee5f9ff970e43a71ee9e856fa97c9620dd780f48dc1fc7f644b018be02df24e8fe31ef40d29e34670da4841c8291efd8e2c678abbbe15d1a55bd2c0cdda28317ecd836b10de3bbfff93e15f2f0e576e01b56efbf9fdd2f71d07d1fb79168fc0adfa0359d2f57b1b4a88c1c8b24d8adadb4bfb9f10d7587 (encrypted)
Stealth Address
e6004b83ea974218c911408c5e1cbe2b1822da934eb69c2d05e5913a66532352
Commitment
c818c1c4493e8158395d70367afd9a1ec3e621a4ec0d702759e2c0452be5615f
Range Proof
672 bytes (Bulletproof)
Memo
a329a433321d7f1238a1c8e5e078dc85221a176f319137bed7019a0cc2f0eb0e70faad4481ac8c79aa008a264205bd24fa28c93dc601497ec10b768776a7e21f64f3dc0c511ff5dbcb2cd4ba4a8421affd253c9d9efdc87233e73495b0c1fcc9069c09132c4c528d449f3f23317088834dc6584a160d25f7ddf9d4e53e9c2059 (encrypted)
Stealth Address
c8af8fe1d4ad493a50a507981f3e193ff391e41e298fac71a43f2f772af1b174
Commitment
68786285285af8194c37f279f4471e832a2a5e697aceee76a4dee1c5a2010967
Range Proof
672 bytes (Bulletproof)
Memo
1fd98df327038d4c792932645598d4fa93cc600ea1cfe1af1fc2297140288e6dfb57796bd69831d0b55334ac0b32e3642ef2b932b4b8037484698d566908a20983c5ddc97bdd87a12e71dd6090f6cdddc929bcea34728c61e15189b6654e67ba95ebb8c4e1791f2143c1281fc6a3bdd6b574fece44a772100cad84714e6e7c67 (encrypted)