# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7a2026f228b5aea814ce52859ff23a99caa46c289f7dfa597101ae6928cb3e08
Pseudo Output
8864524acd4a2eb511fa9f31bdfd9221eded80546a431a5f4a70efcdba54c327
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
267275586c0b17e25e194a7fa189b4bb0df1e35d7511614d2fc0226e40fa1a33
Commitment
60189e2f27b1ba3ad703222f1ce1b240d3dad9f738eb274424f90e4bc56d5b3d
Range Proof
672 bytes (Bulletproof)
Memo
ce491efdc5942c10aec3d988ce5e868f512a7f7436f94044386017ae05f41776ff854b05e916470cc998386640d652543c9d9418880281924c618d5a6d6de6f032dbee11f6d95c19c67fe30665941c8ab7fa523d6880ab528836d4ebe31ca6b4a1bd5adff26d94d44298e85132b6e6604c95f4bf471a96fb1db6f5bc1916c483 (encrypted)
Stealth Address
4cea362f7b80189df5e4118b2cd46ca041a495d742538b6401bd94ef22e1131d
Commitment
92f0b60f40dae0d911dc7b00e300da51e591ce4dc5d4ed88b38c6d2249e74168
Range Proof
672 bytes (Bulletproof)
Memo
d57cde979c2c2edbfbb4acbf4c0497fdfcbcd0b5ab24ec381a5514b0480e8447e88465a760a8408c5a031daa0437e2aa31bfc7249cb99ae870ae8812cdb3cd14b2e81063d6c13c127e939d6c0d6a095e9695650d23edd8f8d6ac7994920dd2dabf6ee82334654d88339eac19e24907bf1fcf7eb1cb0781c81c0d67843d2df63a (encrypted)
Stealth Address
42aadfab76a4c36aaf958d4fecc7e8e8cd088184bfa5a100dea8e46f9526e56f
Commitment
54555408d6bf6860d4ba8c196bd385432cc273b7b5b0c05a4bf9920c83308f03
Range Proof
672 bytes (Bulletproof)
Memo
5fd137df1a30474db04b0570c09fb45f1d8252219e60d10f6e869ec4b57f48112131def1d5d973815ab517b97f21ae1cd71c413a7ad5cee7abcece62eba29a2bca3a563dbea3ca5addd8a152e6031f6fe2180ab96df72d75d79af184a7c1e72503f1b824ced2b2cc51706657eab40be847f6c0f2307be888b8dbc66b414ce7a6 (encrypted)