# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
28d897e4eb42ea4a821c683fd4b30ad5dae1fc711c208a9cc5b76d0f152c3709
Pseudo Output
16498e5dac00f6879d45c23d587c2434cdc4f2999821024d285b1318f48f7979
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9ed641fa8916659a2e71fa45d97f1905dcf9455b82a7d0e22aa9caa85de1251b
Commitment
704438a62239eda9e83d026da22ed79a103b7b6cf0278629d960b6140bfae904
Range Proof
672 bytes (Bulletproof)
Memo
a15dbd166669eeaec1a023c5facec26fc540054ca5d87179d1a1098570f2b0a52d90c0d0c9e87e10fcd651610abecf3c388326af18564e0c3d2743148f8ed46c603a5a3a6e1582d109492fb10889105bb43a8f7db35f1265df557ec29d701a659a4c85fe3a5067396a6d3a873f4dc6302298a5870fdd7bea6f6e87edf2efa38c (encrypted)
Stealth Address
def406a8f77748c40025796c27921cb683dc8d369094ddb40c9be60080e46060
Commitment
b04b9572a1cde8d93620b665aefe4ab6a415a9853778ebcee3f413acdf91bc6e
Range Proof
672 bytes (Bulletproof)
Memo
eaf37108628d6711a6033bf4c68ae1f147a076d120c11ece517ead2cbda3e53ebb01bf8af1615ee7bfd281df4f98050cbf7f1e28ce18f0f2440fd2d096fae228e6bf2668df05e18d17dd7b4f6e68a6d6b458f4e2bf62d7fb7fa4ced9d0a8c6584472a2a43113f6238f2a641efd2601360d934dc625db953361d8bfa63550fb82 (encrypted)
Stealth Address
d069d2dd41fd27b975b54cdf075202a8f44154ff7036a582b96906b683e21c7b
Commitment
82d36e43764f3262d24f4103b5580e656bdbc8d8b124ab1adc448d1f3df13648
Range Proof
672 bytes (Bulletproof)
Memo
1b4876b43a31fcb773250a7bdf0fef4b9d902cbe90855f86654d7fe56fba8141f3fee89d278c685285a56eccade0aa991dfd6b9453c96f0fe9dfe384d3e6b37439e43ec84aa804cc992218528497a1d54b220e5a8cf1edf595377d7b390df3d4425f6ee5f94d389a3c95059c7d6abf2b6694bb5afdd75d6fd95cb3fbb6042a6d (encrypted)