# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
923c504b9e152ddae984d674ca22df6d4743fddd8fc0c63dab73d523959c677e
Pseudo Output
a8822bf6d9aa5832491b2bce117bc69bf9e264a9fa82dd8d26171bc983a32356
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68e20c928f864ffa88c25840a655323e11f5b8ac7f9218cf6b2560fa971a6d73
Commitment
44657a402b96dda92c07383780ca0f54719fe867589cb3ef497f1dcc2aa68f5f
Range Proof
672 bytes (Bulletproof)
Memo
39c2d7f1efa15b6c280e2dd2651fd813a14eddf5371414c395152199db31a404801676cd2dd55ebb8657e0d389b1fea7deac5fdc642e9d33f94eaedacb4abca50a16a5544b2ff134e91e59b84ef7f4bf2dd35ede8e635aee204104a5d5c9f81593d8f6467a5a2eb8a38842ae613576a85043bd62c9656945b0efc2f0a398ecb5 (encrypted)
Stealth Address
a4fccb61597533a6d0bde2f4bd5f9c41d8284fdd10b09cb524458287388b9707
Commitment
70cc49ab24ccecbd500a97e78d87496886abb838480571163c131947afa6e436
Range Proof
672 bytes (Bulletproof)
Memo
a74f7a3993c7c110992ccc7f6df2ef4dd5e083029923ae0ef963d59ea5e3775349769331afd124083dfc13a3e4f8d1d3e1b1ff0014f67778d7702795b7956db5bae07896bb54ae0a7a958e997ef89aacf9ef668a50f6d48b295fe32682bc4c89660fc61300e33189e32aff14df7143043bb1bc9748c31ff828ea632306eb61a7 (encrypted)
Stealth Address
64d28e748764f48b4a2e819c6cc7ae0c251cba3bbacfb439a6eff7231cbec854
Commitment
5c697bf048f6e45ddf05d9a4709668b0e3a156348ba2004bf9427714d266d27a
Range Proof
672 bytes (Bulletproof)
Memo
dd32d175ccf3e64d4d364047c48ac9400527bc2a0c296dbba14dc16e8f33c20e348675242ec987f3454f90d36bae09864322503af92a1c78049a40bba5cd20b961eb9df31423c5a6dd95416f2decc6800b06230ea92656acafa255137be34f808c01e860f6f0c1273b396977c4d24320c31bdaeee16c695544c9184d23fd0460 (encrypted)