# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
56499df87ec6ebe9fc78dd607b3b95a3062f0eb0308311d1b09933a127f80432
Pseudo Output
be16ccb5b08f7529ce49d2372d8fc5756b9a26949d46aaf4934a3d9f45edbb7f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
90433f87d488d60699b0c59d2634b34cfb3e37ea5c0dda54ff2e31c960068424
Commitment
12f423797ffa30929bc7f0ba17b440c828862dd69c24654fff111917b695d679
Range Proof
672 bytes (Bulletproof)
Memo
4b7e29bf6d9d090206fc9d34e8eaa3b4b8442235f9d3e966658a59ccba56722f3deb0ab6c0822423796e8d88e4c19790547c72271e50ec8138d5655acc5e95aa73a2a932a1fe42162db0c0db90c2193beffdc07fdf97dad410871327267669d461d126af0b60d43b8c89f3517f1930f0f42297443a873dc2ad81b7689672026c (encrypted)
Stealth Address
aaadc5ed9e2b9003b83513f9e0ed3be71c25d479d6e28caf1907800168a6290c
Commitment
1ccf14ced59e9522715cbcac88383798f68c00372cfd4ca15e991d5ab0121219
Range Proof
672 bytes (Bulletproof)
Memo
42a3df9633b2d92320b26b91c3e1d755dddcee6a3dc6c690b0810fbe3eb540fbdefaf9db5eb9a999bb4fa3a3f518f2d8c4df8c44fb25adabbc19494a64c7b05e053c2c4020586643e39a7b2980cc7bc64d013db5420088464561fa0398cc0c5d9eb4fa93bc4a9eee8c463e8840e883a9e3d4d8ce45526e3d87142557fa276ab8 (encrypted)
Stealth Address
8a3e4af63795605c04168fa1ea7813ba3aa5457f3cb4f594cc33654c492f5340
Commitment
c46f1538b2b26a8a8172bc1bc22c14710ede4683d6799cae3eeaa58978074f2e
Range Proof
672 bytes (Bulletproof)
Memo
7bc296cfe64c76ca6c85e9b9a94004cbb82b5a2fce0f8a50f87a6d5c70883f97a3ba312ce898e0364f8e8dc3b28ea03be55b6eaca637dfd0c09a7c78064696ff04b6fd721d66a622959d7227b7cced90ff10e7351b028034c7b4c71801fb2e70806abce7976d3abb4245a8207d649972fec2407edab1302b0287dd20694c9cf8 (encrypted)