# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d4724aa4ad1e4094ec81721754789a9a2d9d211c483c3723c3effbaaaaaac14f
Pseudo Output
6a19b24b23b8aa872bc6a40cd42dc499aaebe11076c985064d5b161f7e533f0f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
286fe4b2d0a9e52b0c7c34775c652375f92c9306a898c3daf36c238f3d91c230
Commitment
4893931adeeb3bca51acd260054c4a4540e7808526543d4f77479791cbc20c2f
Range Proof
672 bytes (Bulletproof)
Memo
266aea2e0172d7bc7a50ce51aa345a6ff904530bf683f62b6224b1f0f077ef0a311b54c4c6f67aae5e6dd02843cbc0aa29b489c78cf75917212e6df6232d75bf8cd21821c0af38f895042c6878d33fd2defc5a5ad7586c06ec282ec0e5ba12d0846127b6940c0bd04a8b059be12984933b4602f2259aafdd29de83c208a5a5c5 (encrypted)
Stealth Address
56877a3f3215ce2926e63fd708531e81be8e0d4f57e0472d8c753337ffa5fc5f
Commitment
12ad8375cf1d14369194b36ae90fe6b24e784be2936d0a491e904cfa73fc1f65
Range Proof
672 bytes (Bulletproof)
Memo
d6b1dfb0f2113775ed4b3b231745ba06b42bef5326693eda7d3357d4591d141431add39bf62defa1027fad1b891955b13ceb29fa04421690aab64b3994740a60a77d2de6ad255790cf0294a573dec2780b3022a255376200066fbb460004814b3efcdd070c2dc4366e028ce9c88a20c23f778fd049f9e44e124a04d0c56766a6 (encrypted)
Stealth Address
d2b3b3f4faf8b3dbcd60a874c5743b50abacb16cd78d7c0dea7548bb03ee2a0e
Commitment
0e3f8b7c01dc2b6444bca82f4fd6cd45f7777ce44607b7e81e5e1db903bf717a
Range Proof
672 bytes (Bulletproof)
Memo
2b79f2dd478b550b9d1c729c052fbf537ed5265560ba20110416ce546bb204937bc6cf405d4407ce77df724a60e5223ed3cf8443565f9834446da917b69ce9e5d3d874a45a9b16f07c8b1b7753c1627654ef5fcde074051ab6eb73ceb9845498be14f95c2c3b7f5cbcea215c01d948e3a7e90ee4ef35727e0c7318e66d9deb21 (encrypted)