# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e65f76d10d7df06176c4cc756c26af9c95106221d7d083c7c580413926220a78
Pseudo Output
14147c1162155edb1934db02eb8c166e938242db4b968f5caaed474ecc72c22a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d49a930429226e6a319bdd82764e6b778029a3402c40ec075d94fab8a5f2e219
Commitment
26489dd8fbd2dd48365845a5b632ab585cda09bc3231f07a2b2e6b3753aa8f14
Range Proof
672 bytes (Bulletproof)
Memo
aa8f673ad263c5645b314a40fbba37313175438d999e14e90cf942e2e53342aa247ad6360032a05c5cabbcc573a1a858dc205cd51de45128b14534a3b2c905f1e0a517d54e58d6f70deca28f0cff0923321293b9d20037ad7d24f9bdff42e45fd14e53deb7da4534fd085857d846b53ea6c359a665a570461d15c7c2e497815a (encrypted)
Stealth Address
d86fdd6c3baf52189e9ced93940d738c112702744e15ab3f7151cbc319a05542
Commitment
6a0a76947b79baafadb13f710d0daad61feaf6dcb84002fbcea30cd6a1786340
Range Proof
672 bytes (Bulletproof)
Memo
3d8d801d1002f013e2496048850962ac2885631dd2da53a368b1b227cd03d58effa6ec28b7291cc1b67ffc2c5516ee41c9a343b45ee22f6ba7116756d46258253999c8408f7c80603616195e0514ce7d702860479128de11d0134d754ef709bf961305d07c9cc9969da2f8441bb2d197504b441d095092c49454d9c457a93752 (encrypted)
Stealth Address
ea5e6366d099ce557fb171ed8273d1c9194a25fe6838b26f73e1f1fdb9eb9767
Commitment
bcacd4c3a016607a70964f5b4f9f08d04f14b52e2d2ec23b553f14db8f479778
Range Proof
672 bytes (Bulletproof)
Memo
63b9d8993cb1856cbd3cc96face3adb37899c41aad94a60136cdb2ea4e0054c8eee92f3e6bc391786b326367fea1fd2376a6cc63b1d6e92fb0f9decef5cb9077f211b6de88cdb9aaadd9e2027bfada8f71efe34214fc821d0b6905aa73cfac1a10e5c8a046ece021ed2f1de2386d75a3be9140c68a8c410e612956dea47fd385 (encrypted)