# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
281ca60496702eeabdb5858c2e7a60f522b5e34c7e5d320bc3eb05bb17135a75
Pseudo Output
148976f6c6ca4f15a713e3a4cb281774138764b8a663ed2b0f07bc5b777f5a32
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ea59aced89fbfc8ce13ecebb25076c266292addafd97e5d6c786e97fbcd6a018
Commitment
d07b8ef09f28db75dca1281ce5bc17036a7d226815d5b1a2247525ac6b4a114a
Range Proof
672 bytes (Bulletproof)
Memo
10ad333c738cfc3b3b537b6a841d18375a925c1f99d9aa3a0723be1de9716b7f06a704d852f97dce2c61074c2a03ab1683d2bca9a71acdd554d7fa7c04af70c437797d0f5842356c63e38a9850fb471a4f6b0e244721347c2b83ba1999457b99b32c9a1466d21442e7a7178d36d89afb52765636735be13155dbd027e4a23627 (encrypted)
Stealth Address
b83de32827b2308234692f95267bc8a6ade9c212291ff7ec1de302de5e268c16
Commitment
9af1aa5a092dbf23e7bf5ebd7f0c1b14d4a3ca43a68830e9b14064c355aa0936
Range Proof
672 bytes (Bulletproof)
Memo
143035601f155f6ef9aa4f3bceb9c8e19104ea18d6f28883f5a4d5a33a7642683479aba83de2211e6f2d9e6ff84f55a6497549082363c588b2eda8dbeada4b4eb9d12d1f80dd2f7b10bb99288ca71d16a027d62696f4632ae1aaaee2943b194052b7911f5dd253782b4eb88566d5d00f0656d72446458af24a26e5cd35ddce8a (encrypted)
Stealth Address
64a7dcc33d4527c6d7beb6d5a82e018a468ac6ed552956069b7e28c9b6f9fe39
Commitment
baeace6b22ec1fc3d4f3cf4feebb6f3e6aca6ed2c3977f43b1737c3a527e6e3c
Range Proof
672 bytes (Bulletproof)
Memo
221a859f04641d5ad725b2c7232641444b6f700420c62f371134155a1453f652688babd1920797f600f0dc49f2b6883a397d1dc12f218c2bef10c94bb15a9f79eda4862237ae77cceb32ee7d8f16bebdb54470e2cb03c22e93b8be3d6f26ea47f409b792f9bf644a11650c3776ff03b955f1e9a5925c9a113c6c82c0176a7929 (encrypted)