# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
54488662329232a82072dd8900d45e5d79a4d289eb38d33913d3531c60727c17
Pseudo Output
ca5dee4442c55bdf6c1ebc41b7c4d878c0557568c31d5d2ae23d4da9bbe13863
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a68445f9dd2fcd853b4970b431dae4723fa9c7dfe3a7b0b9773dd17950f5e11e
Commitment
628cdd7782ec92988ba010ed861d31da11d66cad1bf6028a17106c3c19cc9619
Range Proof
672 bytes (Bulletproof)
Memo
a8b0e1fb90dda5209a04a33c809686cfde94a0c5220d71904a63ace1136a4354c32bed7f84dbbb4a725bb0f57d3ff6afd6ab0ddcbe00c76f3b700f8d2b1cd68c1de157625a707ee4cd3379c5ee3cee9e753729b1dcdb7da106c8ec4424ad0a99a7252ef67a42d5e7c0e06febfd216be4d3b89c7f45379e75cb3cdedd2d2fcf42 (encrypted)
Stealth Address
20547477199d5c7a642bbf10bf7d626d5292026c684af94c145861dd5b1fb510
Commitment
da17200a9cb70c5b61ab6dcf1b7c32fd850654a5703609654df627312b3d303b
Range Proof
672 bytes (Bulletproof)
Memo
5f380dedf93c40a0782bb39af0e5ff13bfb63adda2aff08bb743a101313159e9f1aabbc9ba30e088ed3e73c27a7fcd98be2287fd304a45da0d2022f1c1e5be38be04dcf96b00dd25de7770c55576b55083bd4735ec1e189e330da37ae1631bacef73ce3a248bb98d8b8a98ee50f3396730ac1621c9a5d848ef116ef5fd02c0e3 (encrypted)
Stealth Address
8a251ac16e8df0af3c324e2b538469a197758946a60f2b6bbd95181f04c05237
Commitment
7085ec86d1eec98ec3699caf9aed37370d0f813e8b393f2818f7765c2f3ddf79
Range Proof
672 bytes (Bulletproof)
Memo
69de9b04b79777ec22ede7714583f1ef1b4d6424fdd7c8f899e0dfcfd186cb9c06ff4d58fe86db41342eae9b9a00e9ad6a24bd6adf94c5a2e08de711cee06c6e7c3ad523a56de16e0311dd21f28e0f7b6fb5e94d603bad250d18b06f5cb67f73bda1c4a6ac35a9005a92e86e4eb32f39e3b8b855c757c59aaf238c3d1819d828 (encrypted)