# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e141c86e2a04b7edf63118b286718f675eaf12afefa9c89580ecdf57766af6d
Pseudo Output
3c513727c983cc45ee1b4fbf8ff7ff950bfd11f1b9d57897184f4a9d62736f3a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5257145fed5d58fa90e11d0dec91ce7a4aa37610a5e7e60003e68f5624bd3963
Commitment
28538aa511ffaa813eca295ff0df315b20f0b8216aa8b0f8c2abf743129c6f4e
Range Proof
672 bytes (Bulletproof)
Memo
4ddc875012b8ed1ec4d5e2625729500c335a14875fd9ff7937059cd81ec544341eb83d779708cd4c0e1c0c98edf936fe57070784e5cff9274e311743f7b39f2fd3b0856b46abdad5d2725f86b271bdb5180dd5e24d6beab69056b87246f1795c3d6e7b780733885fc273b847f223680e51ac4a0676d4499cee84d467f9c437f2 (encrypted)
Stealth Address
b062c3138076f46ec67cf82947a4c5bea119a2fa897c31dc6e36747b8947e014
Commitment
82ad6f422e2b26c1ba0523a819cbc67be3ad1f99c3f1b78383278af70e0e6c73
Range Proof
672 bytes (Bulletproof)
Memo
a7b824b029c047076ab88d59a72dcdb05ff6329ac85705b6b4aae56c33e158547179306a159ea6e7e69397bf51291f3d5dfcf45898167b58e4497df0562d73f770a932b13414b29df2b493f842a5c7ba02a2fbd179beaf01b10d0ce260071e6fa0648223460c9574a009dee5bf86de4599964f183e4a610bb2b7d7cc53db04b6 (encrypted)
Stealth Address
a07798de543192339108e403874b78bc7e6700f4815d664cadd9b1ad1a6df875
Commitment
087664ae59fae74be7e3fa8339897fe96d3f5c800f73ef32eaf6cbfe16730441
Range Proof
672 bytes (Bulletproof)
Memo
52ea8ad22ddbc5ea245e496da0be1d11042caace683722bd7bf14e37a04ee183bb6e35022d62ab1ba6fc4f6a62b355311b58fa25bea27d87a341a104a2eb64a99e3b76735ec03f9a98637343e1ec7da96fbc0c0eb62623469e84321dc817d39e1d7a2503273564e6c929e9e02ad5027c7b7d56b2365ab9ef54222392b6e3ae5a (encrypted)