# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa793719585ce37c4a3c9eca644c119724486ff6327df725ab56bd14b144786e
Pseudo Output
889adb673577d091165678824cdeaa91e904f9b0d9a4548ebea29b7fab3a2710
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1656f29540ea509273c0b489ac8f34d71929a7842f3b1f7ca0ae3a2a9356c536
Commitment
a474ce26f77b84f462a4d1d0c09bd14315190d94580a5783d2eb38a51071165a
Range Proof
672 bytes (Bulletproof)
Memo
64954fe2fe3a330d91d3ca9d4842add4f2bfd3150dd611a58a971783ff340f72b8ce010ea0109d8393eb38f8d0c3daafc6a4c77ce85b95584a0dab95b567f10954ee13d4f5dc6f7542d862a74f99dc8d9fdb3ff119f49c05f6a67ef0e282beb5320719d970ba89374b5101249394cda0963aa48149c1123c682ee6b9a1884e2b (encrypted)
Stealth Address
e68e33a21d5e63ab3c601660e8b552a192e776d0f7d38ee73c48c47d5f16984b
Commitment
dc6fad7dfd239703d20e688f3aaf01e0496db73c10a8e9168bd5533c3a0b5641
Range Proof
672 bytes (Bulletproof)
Memo
d0aa83f459cac0e39c6b0a1b1609f8eef79f6521be0164e8f2d644b51919d792160783098d0ac8b8a97b53b273030b34a4b05fe586c912f7543713ee2c8f57d6000b27f060e4cdc273c3fd16bf6406f1b77062a68a973cdc5837606e15a84894a65abe06dcd451a113efcadb409e36a6df4179c79cc36b5e2bca04bb3dce31ec (encrypted)
Stealth Address
d0b7d7829f1c6101912e60982b94e4411171cb93880c48d61fe3f96a16e0034e
Commitment
0eb6613c2bc249b3070aa917fd18a671a846ec6974c814ffc5d71f4dff89a71e
Range Proof
672 bytes (Bulletproof)
Memo
0196539d2bd7fb929b7d7fa994d89f1db6f270cad1917655d4a372b43cfa5436f2a9320c2dc977874f8944ccecc50e01712630ac8baa3496875f9dfeb9853a3180a77da00f58149086fc6cff1ccd4b0b7e0bedac45e6b67159a9cebb4f4910069ecde7200938e45a8547f9410de4e461b7659768dcf71a1d82a03a77a3742ec7 (encrypted)