# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d610827058d7019fe6897a1a879880926cf9deabc7af77eab8239117fc812a77
Pseudo Output
cae5aed30dccce2c00524fe9067a0d075178706ceee2034d3b1055ba5ae0cc36
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9ce9cfdb62cb0537de2a3e6e768a573c6d3e246fb61cedd713466846a81ccd3b
Commitment
243504d7aafa45f4fb9bf31873f14ba33927d36d668d0c59a20d4a92ee19701d
Range Proof
672 bytes (Bulletproof)
Memo
1046e8feb03f54bd330c4a841986eed3d340380ece5440e2001d637005a7744984e0d14caaa0ece55448762b120da7ac2498d3578a1dae6d59539120e525744cd9cae476d62fc58c573ac06a3dcc224118ddf1e07f243cb6193be69e52bc032a51929f5ac710b3c76a76e1766189c1e999a9b6dd38a9bbb4011c281c49ced126 (encrypted)
Stealth Address
521f124802569fdd1f1d243b025992f7a8466b98c0acb2aac2228bb3823c1917
Commitment
a0aba8c8c9c8d20c0a3f102e6e272554335de5c01e0ee424ed5a062e14415928
Range Proof
672 bytes (Bulletproof)
Memo
29598dd4e705d5fd87fc2b0f3e6d8caa1acbee75f9dd1f1a60d7cc80307b80e0b45171332906af336a1df08d2ab7a76f34f03f7d59be7842cfa6aea46fb7fe9a41bd66797b4e71506c2eb935aa64e69cafd5c02d503fff9bbff45c7a4a6cb1166ab0e4343cecc8c6f0ff63b8ac412605bc84f2d12c3fbc2fce43fbba52a99fc2 (encrypted)
Stealth Address
b4bcd4c96c96dbfc7cc4a8eb8247de8611c5818444430f78694fda59089d5040
Commitment
781c05e9a9efd2de4fedffd3c27dba9f20488f0fbe3f517dac73dfe3c4e3b064
Range Proof
672 bytes (Bulletproof)
Memo
305954e5868ad30757731de230a80e05f784c9f908d6ad3eee0005a11520d5dbecc96922f0e8d7e5efe964feee47249cb198ef514723a57b9b142893e17e2fd22e450143df90cb18ffd17a735dd868965cb53ddcc75e471e1841c1023a3eebad0854b2202a30f008ab44b2b048ee219caa419210ac78cff7ff456ac561884332 (encrypted)