# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b28947395628d3d77801bb020003193454b650a696d61c542369f482e7db885f
Pseudo Output
dca00e2118e52d3c5ff59c678ff775a78a22d51bed87b20f286b596165558c4c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
608a0ec2e4c2f9651225c53638d35cf02260121de5c28b00eacf5095270a707f
Commitment
20a3391ad73b12ba26c5a220b8f93a55f4a60a3bceab2beb60239bf1eeaaa24e
Range Proof
672 bytes (Bulletproof)
Memo
e0e256ffc98813ae034722de02fe5f5b9b04b762174e57addf00f0ed48ebcb4c3ae2f1cc81c70f2d4c7d6e9d88186840b2ba0dea6ad7c75a25ff145667ba2e888e2e19ec614b4f1b8ab1f18cae962256e3e958a4676d2cc591082f9d433e0e8e95d7af97ac56f106c05a7978687b10502705afd0054a4486e9754a95e6e0bdb5 (encrypted)
Stealth Address
fe7242bb10ab86e56e8f0fa533d30379b5baac8ccfed22de10511aa8eacfdb1e
Commitment
c8c7408f46884d183d07e1705588ea799db3357563073bdd5dafd0dab1398405
Range Proof
672 bytes (Bulletproof)
Memo
fbad2efb49269ac7fe91a377c7e784464d155a49dcab5b4422e0c57d94e3910ad3d9759291a8bb804335b610ce54a91ece1b53c1438100c14779f70490208376f43e0149913d14655ad1e7882a109da81a45438281b0206243fe981136188bb867560f845693e640f105938017a370f2c3ddc2b29c97d4dfa3edd658f0258209 (encrypted)
Stealth Address
246760abd1da90672ebe3ca2f789601a6b0a9ef13f057bc5254dd50588142452
Commitment
8cd4fc3f2da364c2a6895a865514895f2e3a7639be157ab928c3343dc9e03a14
Range Proof
672 bytes (Bulletproof)
Memo
f8625743e02b648669d1aa2ef7ee11b9dab5ab7b6064854bacaf6d1342623df7073914986d19e0afe0d92a55dd2defb1e8fb6f645caf8d2bc35809037f6027fa228e48215d4c54de5999ae1a44285b5e99a7e23b67f04a62d60d8af7ce39ec73d18d3414361785cb8bfebd4c7aee12b6f2578c7fff30c6c67ac2c8f2476d8a6f (encrypted)