# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
28926a4e333e8df4947332c04910b07c80605d164301f0039c1ded557c20de58
Pseudo Output
1efa5d00c106bdec2d7764b5baa8ded110347a5c76ca2054532f72c8a01b4e69
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d89aa1636fdec59aad2606edf370a4042701025ded37d225c1f6acf7ef8eac19
Commitment
886244c06aea11f57d9ab821896b6537afaebd2fac17907515237dbcc2780863
Range Proof
672 bytes (Bulletproof)
Memo
e285bf033ca612cf7b1b796f5c6a808a1182a43a605a0e2758236995fc689ae61f4dd1a1a8100ab9aefbee5764d1da861b0332391d604fa77ed339716d3678a65bcc539fbeb88fbf066b8b0b2920daa47efaa239c5ad77357526250b3b233d85955acc9e705d46d7d2ea74f63c248c79c8abbec79a276b037c0fa8562bbb85c3 (encrypted)
Stealth Address
f23c06b7e8d433c1fe2dcfc6fc83643aef027c5f6566896fae2c784cbb17fc46
Commitment
58ac70423cbe25132bcb93e162ccb9dd72e98409a34d88bdc44b663475deb70e
Range Proof
672 bytes (Bulletproof)
Memo
63a6cdf40b088fbb4961c5e71d84022511f11e31659527bf24fc4eb0ee810e586b0823360f30fb1e7900ce32a4a8f51894fa509667002552a262b95c9e2dfabd1fe4b54d2a4ac58a8c3970e81e9a69b051aa739f26458e02bfa71d08c5a74c3551fbeb4bb83c1834c2bc26ce81861d0b70df9866c2caa8d5744c505d207ac89e (encrypted)
Stealth Address
067c44a8a75570fba9f62f1197f70e4cf0d36fe86737301ff2886bd10ced072c
Commitment
30fadc843557ba1072289efc6cab54c5a5741e22943df1678d25922f4e95e748
Range Proof
672 bytes (Bulletproof)
Memo
1b89eea5b332dbb4f8d732a195b7de4c0c25cb2e49867fe9e4e8cd7969056ca27e786f6dd41bbde834ff17d30741e53aba24d34141c368084b544c94ee0bbc5097d9771bef960bd18c50d1baf669f2876a89f55e7bd87404409427d55fda8782bbc15b45c94d8149e95b79cecd29c9e023151c6601961a5f958e72a5700c88c2 (encrypted)