# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac92cfec81b92161afe6fee1998f6270a8c2ebdeb6fbd09ed3dd36e3b4baa428
Pseudo Output
92253305389688cbc686d9208ed7014bec4ebdfffa46de79818f705b29dba54c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5eb2830bc7bc1863826073938d028cfdbc38046a921a413083ad83971212e261
Commitment
080ccf76bd21a7ba7d3a3e3c9f5dc77d1101f6cb79c5c0d9d0451be29a514f61
Range Proof
672 bytes (Bulletproof)
Memo
8f0df9413b63c2b20387014824a59702208dd8b8888d7cb04fd17992272ebf2d4e55036c0b46eb0e34191c73d690234c7e40d5a5f876aeeb217f6e53332b024ee1765904bd2d57c5489a14badd2be048f61902f1f3519036bd747c053f358f1c8d1877a697dddabde69a3584bc84593a307d42184e639cfcd5014acce0cb4567 (encrypted)
Stealth Address
249a170d38926caced09286355a8e32fa90752533f32c7740c4a9c6cd26b3215
Commitment
82520aef1947942eb9bad92801cfcb7d5bab54d244b70e9fd8a214e12e2f7b30
Range Proof
672 bytes (Bulletproof)
Memo
c2f06f9dd11dd7209a4e9e7c69ddc529cdf5b8d40f4949ce15cc8c63806eb2f889b1aab5dce91d9011a245102f6410c2c30d35ef54f39ecb6c8ec9bf91827de9695bf2413b99975a1da56f998ee99c550614599d82a7d3c9c3b4365419d2a7f37681e797139414f4e957a4919f81ab1d2db53f6e0a1f0ac7f23978e409ea27c1 (encrypted)
Stealth Address
8ab4d1c11cf5d88e75f31dac475b108ec05c2940d5ca43b76556b68f48c5ef77
Commitment
2a933aa57b656b2d6aaad287b94bf783e69992140fa648a1c6fed480a7e7e211
Range Proof
672 bytes (Bulletproof)
Memo
3e4732d6b858c213f37681a510ffea15b9d57cfa10e7142da7ba6c372a5cd27a0f251200a9d5265a242ca08c7df1bfdf45a7f2fae304e69e531b9e36fe2ac4696d87f049e8701a03cc6784da387e83c661e10c60081a0243df1637fc626e5a6c439ec81d676dad4a4d39e3994ec50b6813a5118b3a54f9e02d265a4ae774b38f (encrypted)