# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
065c9f6df837dd5a6db8183fbf8788312b67b61a5a5904f7b899307d9152627f
Pseudo Output
56560d174f2e32ea467058025ca190e341c3301b04fa4a0f2d7c8808cfaab13b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
48536e56ed6432830e5190291e23d0ebd036111e6a16da3fbfbbda9dfbc4bf49
Commitment
440adccaf183e71e406dbb6acaea5d1fe457940487ea6f530adbf0a564ab0414
Range Proof
672 bytes (Bulletproof)
Memo
89f4e744483e5ff84afd82a7902c3b53296187bef90d3d3fc1d7a762a4520385fa885c3e194c5a4a1525cb757eb915615a310a37a37193ab422572cb1636beed9eb573f150875a40fb47939e8492404a17977ca9bbb876d5e3c3cfa1ffd5b2eb050928bb1630492692bb689253c93b5a7b81e095450fafa9f45220c2d12d3718 (encrypted)
Stealth Address
a2daf7a0a70b27791f2ae2668908795e3b66d73ee71cda286dfe9a625016b455
Commitment
1c06d2e8520807a467d617928d2791170188ea4443628e76ca9b442c38bf6a72
Range Proof
672 bytes (Bulletproof)
Memo
b764ba43a0167cc1388710778109b74b4edda8f2aa0141e2c2b7173d29acfdcd952494d2ae48470fd389b66718fd64e549e6f5491d90b901e263448d76d86b63796c9fce442a5ee108a6d0074df0d017ee3c9f4ac6a32fc8bc27b5c922cad169422ef2daf7a1a31be4ac53ab8f176e6581e90d82e366ac51c22daf4dd3b4e495 (encrypted)
Stealth Address
bc7caecea16b8a912a578d479dbaf9cc41dcd259c73a612694e626515efba30a
Commitment
dca070a81044b0b40c0ba2a9e4926f201fbfadd5ab97131ec8f3108a036efc6d
Range Proof
672 bytes (Bulletproof)
Memo
e5432f1b2a90cea997938eb51112fefffd12c968be497d621440c4fcd8e908b961e5a505c9136733cdc7e505145fa918f9bb17a066d57d69f605fd7bdf29fe01164c1c4b796328a25fc786170f88caf8eb4a6418dfb6589049c08f9c0384b3ea6a4e552255dbf6e74d01b2494a56825c56b985283f15c8f323a69204391b6316 (encrypted)