# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
60d6ead5aa57a79ae8d2193067d19038fb898c2234c4342976e2701317ee5455
Pseudo Output
18487c1ce860c14d86116aa3703e854edaf80b9232371d99cdb30ee9c6f8e34b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
62c744b2a102e0031d9f27c67e749e90e92bbadea9863fdf7589e127fd675e00
Commitment
74059bd09735f11b99372e2c4eec9aa28200bf2462ac940f46da4f7f92675769
Range Proof
672 bytes (Bulletproof)
Memo
9a295d9afeefc43edd06ff0fc050520b6848d24fff93f406fba81f640e9d0eacfa880b7296fd3c89b044eda778dc9e59656e1132e930a3d4aa94bfe19fec5ad09c05bbd98c526d43cdb49e73f7fa81b4d35f0e11b308e23ed2d921294baf38ca318fe2bb44774da67e17d8d38c97dfc5af271778a380d5fab7ef6b645655bd8a (encrypted)
Stealth Address
e47e2a57cc92900064b9efe5565ccf4f61f43f877f421236760022b6996fbb6d
Commitment
96f222dc7ff6e1ed8c89afe9490af1881027df7ff8fec2fdf26d20f480bdce70
Range Proof
672 bytes (Bulletproof)
Memo
feb68296573e910c61cc57fcf486c63810d6b5b055b39ab6b99b893e611de760a9ebaf3056df377318bea74ab542a28195980e2298e66c689b7e3d70eb6e65e1993fa42988f15cf64338bb5c0fa1ef09db57b2b984e1d3434788c3a2439879ad4585d01225ba08a344db74e123c592cb529bd653afbd1175f3ac7dff1c5e5aae (encrypted)
Stealth Address
284074fb033d5d880b91298abd97b8a25acba1fef6ce56ce50fafdbb6de43165
Commitment
927b8839e28fb47d12f28ee9388d5bfd4c0069acde28ac9696a100024758a051
Range Proof
672 bytes (Bulletproof)
Memo
7c8eb6973420991bab6e152d3fc09d724d046aff689e88dc137be1bd5ea59952be5d91ba058d928abe2d32e939982f6c94a79ec750937dfb6e3885c353983650dad2ca2f0148b62e2761d75adb822ae3c65b4b7ed61d957da6353dd2e8717743c6d6f650428999eb67a33cac93ee0ba94cd26d4a1f28bd7c91c232f2a23958f3 (encrypted)