# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e828fa6c08749e66da56edcace72a3ef20748a1bcdf2ede8693cbe5fe8ffc55c
Pseudo Output
667341a28709c5eda11a7268c67d609e4b49f2df080fd0f8c2a9ac2806b36318
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
286a8a1ef302b733c0febc563e67c2205897d7c5c4c75bae74acfa4dd70d8e63
Commitment
6e93b06b594aa78a158839bb8fb7385ff0d22cfa4db2f4de7e981ab4b2884812
Range Proof
672 bytes (Bulletproof)
Memo
2e67a434ed44651ea3f82635c7e7592fd53dedbb7eefead9973cc77537be1f5d771f0e7ec0d040cab02ef705b47a13d089b293811cfcc60b913f86b6fe9356d2cc4caecd28ca4fbf8d07098524948436ec3cca57de92f202b57ae5c02cb587ea9f33b93c86e8655ffd079eb693af3aabdab8fd75f4562ed096d5d252fc6d1a9f (encrypted)
Stealth Address
4c1bc98873d6283b85070b5b520b1beafe8ee3abe5d085dd2c6d9165a0497b56
Commitment
84553419a864579cb709758cf2dbed0a019fc5385db1433f389d2f00010ed077
Range Proof
672 bytes (Bulletproof)
Memo
1e0e76e1c939faf463c596f72cbb906343b8532db001248236d98530a603d78054552bc52a9588fcb60a3e300f623287752b92cd641c23c8bb70e6cb0696b4ef9af97a1007bd2346d28c81ac35c07e4a309f63b561b1b62817996c4ad52bfff6ed4dbb3f22c80850f49e2af8980fe3331e4210857784b5029d0746c4d31add7e (encrypted)
Stealth Address
b060c3935e559ec640ccfbac93913a3fe1d5dfad6f6950fb9f16cb5b5f18f648
Commitment
067717bb2d17eaef9e8b444f592f43f9fcfd3741d5747213774da2806531aa35
Range Proof
672 bytes (Bulletproof)
Memo
0176afbc5f79695d0bc2f3bf367a4f707cf192f0c9b85ce2cb8c9aa665f762d8cfd74092ccf7687d7f7a6d5dfa2bf7b7b6292debcd64aef20c8445402523fb917ca8bff316c9a44ce2ec4aa3d3fbc886010f8ee0e586d56a21333e9f80263b055f3b7fbe698383e4dd9c893061aec956409ee60dbdcca341e254fded753035f3 (encrypted)