# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a435d4c6bf289bce57bffee266ceafe13454ef2fb7cd491c4159029152c4571e
Pseudo Output
48508239c54ec9a1b7a41f216f39f6adef714312b9ea071afffc8e2a14692353
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
28fe370f865c539d2d69215767f66bf9dec8f3f326de04706e4bc076b14ebc4e
Commitment
34fb82dec2f1b42f2e4df9701a6080c6fc4a177b743b7fe2478fa12d01faf350
Range Proof
672 bytes (Bulletproof)
Memo
a47fc25a43a2e4bff6a5c7cb1f52b9cf9aa97f27c69dc7ca6f18179becbb122d7572acf0007dc0331aed670b284b12e545cb08b37136bf46db6c10d5c52a3d91618ec367e172233c68315e0cd326a1660b78addf9a2c81e98b5b0d7128ae3775c9d2ec5b769c5d2aaff4f99ebdb4ee8ab6d9cea61ec03c056e8f2edc3d7da120 (encrypted)
Stealth Address
cc7ba45e065493c2db9ef13c5134cbb4d5e82a1f36a73a4e20bd842defded365
Commitment
420e0e66ed184035253c7e8ee260f37d88167cb38c48d7bed9e7720d7fcbc67f
Range Proof
672 bytes (Bulletproof)
Memo
5d6cee1545f343410147ccf8333859b26f50ab9ecffd88f7652e65b76748b9348010453a0e29b9a272ce1edc651f821923bc741f9f0fc4cec4a1399be1dfe1322b03c5f4b276189980b8c652980cc062b44b202b9e9b7eef9c1d89fe97c31f4ea8eefcd356da7d37c84797c97300006d4c1351fd130440926f4ce2781727a143 (encrypted)
Stealth Address
60944facb4ec9ed1f5d21d83d99c11c69382ef91c22f71cd675b2eacbfd70011
Commitment
fca7ffecb867749f07f5a0044a8a0460ac4f9b4a6f9447f43800741e69a2cb11
Range Proof
672 bytes (Bulletproof)
Memo
e5557676b31bb88d74c9ef883e7506bb88d4436979584ee40e464ba7e89b111359c9a8f5367941a17fe01ec9d13f28bf7f60df4ac7694c2650fb8269e6304936f8e83241553e4839d95c6ce8926b41ffdc5e17e782c81ecbc0ec162e345d1cd1b0aa00c999cf236243436fe291300d116f40cdc958198e1b5ad62e2c701201e0 (encrypted)