# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4bef781290e55a81eac79c24861f78b0505a2901608a11138ebf1c172fbc278
Pseudo Output
1288e8da41eb0af6cd1ddc51393819a6bd89347f5b3b0820c531fec74a11934a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6092d668919c8a57afa4d2c0ee4b0a8d428e688edf4a9fbcc9da03cea8417033
Commitment
be7f49ca9eb986c3266e84d3746bb813c489c97618c0ad66cb8515dd4183e505
Range Proof
672 bytes (Bulletproof)
Memo
32c7c1d29a46f62e960cd2c57145a41a735206af5108f562c9de5a23d935ed82be0f0acd6cdb57779d660ba65b42bf8241129a8be75781d37118be4cb319b2946012b4a0ddd0caa00a03151702a046bd790635eeb2508613bf8bf30772f16b7bacb983bd671320335a94a5ee3dbd99aceb5e6fbce2d6986d27e3562e4c9f95c8 (encrypted)
Stealth Address
cacb0c31844dc1c938441f3cf216e1647dd2b52d141e845e9d8b048ba855bd30
Commitment
ceba757da2aaa1b1777b92b46fe007f73e3e3c1fc096bfa7f6d059b43e67cc01
Range Proof
672 bytes (Bulletproof)
Memo
0c12bdc3ecced88d963abc5fa70ca228af6e4b269a3a4c1bc1ddff92aee790662c29de2aee123aef56cb075e4c8377fcabe5a16ddab0e0cd16b59de794b161f36856fd84a839ff40cfe7ec91c33920eb8a836f700178a06816bdfb29a25c9b53d94e822dbe21b08fab2b3934143162da0929572a2dbdc445a87a1f6b3cdb3beb (encrypted)
Stealth Address
d46b23451b4d7b9ed9c904541f2026adfe6fbe1e1b87a62e217fb09749879a41
Commitment
44d85bfe8f812f6cd6152ac7a776e7d9b0ea250696313ca13ea62fb56d023f00
Range Proof
672 bytes (Bulletproof)
Memo
ff7aa324efe6f2a5516dbe0c75ad2e1ea5912998a0abacbdbd0efb23eb5217e8d3b8279388130b1402c711e764a273484c981189862680b1be909f7640dae6b59df255a6a681e0b7d9a80106a0ffb924128f1f1621c4be591a6330266bcbaa898cae4b3284cd3fbe304e6f7ce67598a188e47c405ba65073beddbf1734fc797c (encrypted)