# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e23fd87df74da5592de8510cb9ef83e67e489d146426e8c1605013bfd665c08
Pseudo Output
c613e739021a7a16e1dac5f95c178f46644038cce53869762d498fcf0381421b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
28a0d07b47ca7840d228ac538a16b41a80bb06ff55a7314295fbcb15948d0843
Commitment
d423ca04a02da9e503ddbc5fa265c6e59ef93104ad1f575a98258f3f29367c14
Range Proof
672 bytes (Bulletproof)
Memo
e87dbcda398afaeccabe497575badba3ff557ff8bfd329a3a76ed16f2393e85963523d2c5bc9c79631d3e5ebf84b3702a6026ca26b94ae88a32c17114e617d89ce5a11db1fc5072e71c1d0c43e224b8bdd987cf958c6730b33c99090d9af0a4e09813b9d07bbc816a3e41630349e17e749556982ff0598ff8e030c630db79126 (encrypted)
Stealth Address
90c052dc5f8b0cb08658cae907ba9a1cc9fd0316cc149794e98c55d6b6989918
Commitment
a4009bdb4ff6bccf44fe1fc9dc948b0039947a098141c52724cee9e8ebf14c54
Range Proof
672 bytes (Bulletproof)
Memo
836a878fcb2789f7686840f96bcce0f6a522b9f402522ed3627bc4aaea14d49c1ba52a5ace8a4de276432d447ab0f7ca2e6378e89f11fe89a5a44a34b2b84003149f5d354ed291f58e3b2c6063ad324a05d26841de7801482e9719cf4125f55746e0bd9960c0cff76b28f3a1fd8935a4016b19b243c17974bdd47cfc3b5a7140 (encrypted)