# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
060f17a3b42671d3a9ec187ae72122ab779797fd4d9e8d8a73cd29a84733952e
Pseudo Output
4acc33bc771e566260e38406459b34c96df6660ba9f1061e94f54cd72f488035
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
283d68eff3840dc742de38f4ea681e447076b07fa838d8927f1aa46127ca671f
Commitment
18860f8994bfe6d9bc39a910c9b9575387a687a445fe174c841009b5a7e2a13b
Range Proof
672 bytes (Bulletproof)
Memo
81cdb403605784c0a6b94d8f0a0368add60b95d58358e3c2f8b80caeb82196aa06ee1a7a49bcecaf690a17c31f78b9ea6598712921dc689c4011cf2bc4449e8b0d56dae3346926fa7728e4ccdf290f9d398c88a3c38902c264d5a9dc7fb744084d3708794bceb5f264b3cc747dca42756522a585c3dcbcd07b87f4f9e88adda4 (encrypted)
Stealth Address
e0e9b32c5faac2339d489a52526fbeebf1a807b6a73784e75e15a6830b5f6008
Commitment
c4e1855ad69d064ec3869cc8f8ecd74cb6d90d7b97fe89154c199b3cd738e91b
Range Proof
672 bytes (Bulletproof)
Memo
faf4c13e9accedcb26bd5ca0e7f23b335f1e99db8321d4c35372025d54087aff6fc918df06517c8f8d152e616f2f9807ee6619835569a151094bc9d393d48978c53fc3fe58d0a3f7b16ef61e04f5857e1045d2d9c5671602f06dc5928255c962a0a155d1cff6f11173cdd6d3c03940539b7841a8d01e56a0547098b59562a5ff (encrypted)
Stealth Address
1860e87a5c83c658e18cadbbe2d93c92027d28a857ec8527c0489e1792727f4d
Commitment
c8a5ffbc044de80d1517ca88da58a333704556f1f449bcd28bbdfec4014f6108
Range Proof
672 bytes (Bulletproof)
Memo
bc483bb24ffad0485e20d44217777fb1cb1f7c3411633b991338c55c6524d15615067702d140b409446b5c7a15799e05b342d24f54668429c531dbb33437f028a767680193aa31e6e25864330ab7b0f65ac332a6a486bd0e5731068e8a8e2d70ac441b66530d1714a23e31acd1201cc2fec5ea8f963ee128185994bb7d73507f (encrypted)