# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38d713ce13ad997192fa37af2c31e53eb56e33605416042469e4b8d477141f22
Pseudo Output
28ec92b6ffcb472d5f216a1694e7674fe62cac3c1c169139deefdd1621b1f053
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c28e3e6dc071a9dc48dfe5b4f78549eafb8d03ac8eae378451b3995dd750a126
Commitment
1ab8bddf2a7284cd695ffc0866ffc2aa7413f6c034a964fc9ffadb139e539226
Range Proof
672 bytes (Bulletproof)
Memo
1345682e9ce7c9451932dadedbe5073a84094a3a9d6b64ff94588c5ff527f9f6356bb0ef54f16958e35e65c482286e5e17b75392c8f358f8d43b550ef94d6f3b5209ceba67b411786f0cc2f47cf003fd0f17312b99b3e2b6308a6fa3673bb44d33f6de07c79e19f57fd415fca0fb59bc70194d16608d570180b56e4771a8e516 (encrypted)
Stealth Address
e652944a4e48e63535a33e1fc40dd80a0d261820ee2dc920f2d50ba39dc27608
Commitment
f28e4a8cbf6c0096fbb7e45b6d043b928a08ad79253c5a81d8514d0ddcec5e1c
Range Proof
672 bytes (Bulletproof)
Memo
c0e7600c242654cd301bbaf852d94dcfa9158b65cc7ab4ec484c513faee4cc022889e1d64d4c581ef6c553f5a1ae652fd4fc017a99afc857c830784f81d0eabb80eec068227a1237d401a4d6c30afe1baf99118b1b435946edc7e7590c5dc9608b062a4f3f396110c83b4b8443fd211a459808f91c830756db1baa24009d1295 (encrypted)
Stealth Address
8a2ff1664786013341f87655eab7f582ba4349ea407cd888c0c6a023e8456d46
Commitment
5c6c3c5e121c12247bee4d8fbce2962e70beeb00454955762bf2259161694430
Range Proof
672 bytes (Bulletproof)
Memo
36f25c60fc4c942f95477029cd1839d70693b5dcbce762d51cab0c7330887822f143e86a6d357dd105dca2a530872428884ee376080f85d8c29a584a1c1ed86644e86d047ea67b1b9fca2c8df355a4a4a7579e51766ae696b8a4bc953131bf089c79f01f6893b76eabdd9894b69678925971010de887d44ab98dc99282ff2671 (encrypted)