# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0faa2b29b986096e6140c7b471a484d097da016310613a08e76243925aeb52d
Pseudo Output
d005ad2df95253ccbd1427a1d7f67f34ab91b2bdc554940324f330101c64856c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce05e26b2c6b4e3af885534172b62481dcf565edceffcdf3e278b48d2083512e
Commitment
4c4388260eea56ed155157225d514536149ad38c19349a58191d01a29685f360
Range Proof
672 bytes (Bulletproof)
Memo
4e604891adb95c4282c3d8ee3cbb1d2b053604dc051850a927c1857c4af616ae78db94a5bf03269493c269bd9a9aef5a72bfc2b721e91eae896c36e15f576d946f250720650c526952d52734b17d694528abe84e7812ebf0fa6791ceca4701303e63df6baf842dc6b31f00c0d1060817dccfe135c1b3457b03152d2d61642c84 (encrypted)
Stealth Address
f039ebd021cd8d503731d8e680f4cfeacb7d14b6247b42428dc4e4d6442be21d
Commitment
24dfb3801874dd6cb4c7cfc69ee0997e978da3924228da4c43cd070ab4d0a307
Range Proof
672 bytes (Bulletproof)
Memo
742a6b56ef5d356553684c3b30ad26dce8a8bd9b48765159e9582e1c122b33c5ca0e1ca99b48894516914330d8fa1b81407134bfc980a1c41c69f151801ecfd10f1cc808ad4695a633a111f4ffe526fc695acc0a53c7e27572e32d407eae6f0e3176d6ec359abb317089ea269513ba807a6b144d0d4a1d6cad0472d18ffb5e69 (encrypted)
Stealth Address
d2a8ea89817138ebd930daf4db62469aa1fca9ba3c6da161428e85ca2df8d009
Commitment
228545376ed9746c2091894866d1fb92d49c571968cf413e5a8b95cf388a5b3f
Range Proof
672 bytes (Bulletproof)
Memo
a5cedc6d48a2c66fbb67584323ab30970b7e01c23b1fb6483f2c5144f50f7fccf20373bcb3e005b12672d32182fc5c3b837b4b96e687152e1528fb89d28b1fdc9178369b3959d94bb0c1340d5bbc8e9a5639614244accf7ceb0a1903226265cdb53d53d96d2dd4b80faaae1a321b2f02b26bccc9f6e7fe0607088ddcd8002ad2 (encrypted)