# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
500b0798a599b1648095c27db83d18854918bd933bbc60bf08689a61fa6e5023
Pseudo Output
082b0ba419aa1997dbfb5d0994f0dcacc5659145a81d931f3e71310b1faa8f1c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
281929c76320311d2e0762b97ac1ee96366afc851004429ce2975482da572b5f
Commitment
7eac16d0621808fbab01c7bf915016639a82041d28710bccbe29ca4492ac470b
Range Proof
672 bytes (Bulletproof)
Memo
d9acd8aa17aeb69c79f4e91343924df8a33ded471de0d2fd67ec5e5cbe32f680521ab508dd6135a9ee2c05609d0b386a4f186f23caddd136378736415eed848e1fd7a47e637664eed0762ab3059ee5888ad8c8bc46f03586bc5f02a960bff8bfabe06a97d761bae6c1d5ee95b11193cffdaf3070359a8489d20fa91603bee0ef (encrypted)
Stealth Address
ca25335d0848a2568642e5fa64a4fe94a9f89a90d0acc0537ee05db11d127e52
Commitment
68449d82b90d7792c021a64c62f9870170e5c20f74bb079d2b2bc73946b35f06
Range Proof
672 bytes (Bulletproof)
Memo
85eaa2d27f2410a15b396883359963ad69658886f9b14d232a7d137c86d968b3ef83f1fd7179f1b32de9e77f22507eeb763f9dd666d11b69a127c21fb1b19aba7acbff8dfeda8941d6b5c12d515aed933df8ba43bb390e55e90f387862da485b8aed2d5d057330f3c9968a69d84ef90d50efa80d5df02f0ab1d1c6ff17a4b66e (encrypted)
Stealth Address
fc86bcb674a75c0e731639d61f922015ca2769b6682df70db72e5d647b2e555f
Commitment
fcf2d1a6cf360fcc6da948f49efa180befde3649beb746c2e3af24aa0064c851
Range Proof
672 bytes (Bulletproof)
Memo
861271dffb493fc62e0b5cea7bc5069945ad69c022ecd3f03b1e1ca3a9d90adbcbbeda898b7c58cca91152332169fdbc96442a780951cfca330f7b3273787bb67765d1f25b241d30c32e43b8905066ba680a549f228c31c4ec0f2069bb342fc19bbff0d0511694d0e38945e80b61b4167c161b9522b33b1e0e6dc4d4b95cb3b4 (encrypted)