# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90625bc2103648af8866db04218a77a66b89bce3d385d599b290eedd4a881d4a
Pseudo Output
acafcf550e7df67df48c604ca70811761b8921b7ba0d4bef84c44ef832a33a36
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
489c459e59975047b045792647cd719094a8dc68751e474d10914f2344caf47c
Commitment
06bab12842cc332a078b4a4ff7081bee6a28fd1775aa638afd60ed7fd27ab829
Range Proof
672 bytes (Bulletproof)
Memo
eed6c3658bd4cd3fefd4d1e0b7358da08bc2bacc85450748257fb455edb52c66defeb2673c5f9df97f5113c812f540cd78da37bada134a208494130ab54e277f99a8ca831f0a70373774a114cd5e2e6765d3e33f996266021ce5b892e1de4ea148d22cc2290e150dd34fb71bd08d311e6d80b621b52807bc940c1d0d24a68bf1 (encrypted)
Stealth Address
7cc71575bd68f152ca82671e4f085b246a2ce1f21fde9b09a33fe4ec40276160
Commitment
aa5d318dbf2e4c11af7a9f0541ae1b4daf257022d1aa3075c63e1e396a695500
Range Proof
672 bytes (Bulletproof)
Memo
1c41629a1586ef9891cfd1b668eda3833ebdeb5f03bc1cbc07d76d027bd0312f42dbb43b98710cc7e931cd9df5106ce02796f07a20714dcfdd8d21ccf223c9ad59c4440d20032784d7192d5f3f10c19e4edfab37f4da42d99ada99f76823daa0bf6ffad2a866ad8486ea66394a3e127a6182d17f6701adcab7512bd7604c5593 (encrypted)
Stealth Address
8a9f9537e6d581776e8827bc19a7291223710d13b04cfb5728e389ad09341277
Commitment
3c6199eb2c510e1b1c3d9a22aca85ef651ef8eacc7ce4a150ff72ed49e61402a
Range Proof
672 bytes (Bulletproof)
Memo
bf154dc20ffbc621a1ee27a2adae46d6e6cca653101011a0405c3282491490942c8e89ebd782bbc9dd642d6433314e6355d73045b76ac042f26543a2ccec21d927d9925dc199377efa3475f80771fd664ad7fcf3f91173fa8c38f194bb418bb47aaf506845f586ae7699072ac67bffb51d8033d9000b55111f1c698ffac5c09f (encrypted)