# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1246e739297942bf20e150bac8714c8041dd3354569517634a107d959671ec46
Pseudo Output
52a3f2ceb77acd0d876e1aab95c2e7b1cb0b0bf19df12d57f18b9ae4d339153d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
28818aa385b78ee8040cbf951005257155b36acec7d67f486d82ab0f7045152e
Commitment
8aba1de0e494530782a3b66d0b2bc81c61a175a9e18483137732ca9d7d877f48
Range Proof
672 bytes (Bulletproof)
Memo
e4f824794fa648c5fb7bc2d077dd8067ac373c03d64f15eefa6307dc705f1f96651a0a01ed215e7a701d5b81941c7ad5ed1d5b2f3f21b9b34925ad30cc8621261a7b91dd99edbd05a2ad164acefb340d682a8b88647d888f66206b89a62688b5cc4983099358312237f280930759e35c6c604704f805955471342e60de6f4b60 (encrypted)
Stealth Address
10eba78e6079d9a7353c6f80e83a7354ba6a31ad82616708d2b818a5495a7547
Commitment
687cbf359055af7fb41ad4c08652fefda536456f90f6de165d0e718b3461ea01
Range Proof
672 bytes (Bulletproof)
Memo
d3fb04726930b80e23cf432510557f3e804374011e0f9b4655cf31ea4ccf7320e945da6645070354501255f2024ec64f7d71f56f7be833ade7f36aff80b26c49873a2339bf73cb8cca8b796bd1cf0cacba23f11ddeb654883781615816ae41f397e5a86c55252e80101d2ed53b83bc2b1301635f60a1eff2c5c13df660667a9c (encrypted)
Stealth Address
c0c3409290055c381dbcfbeba01c1a10e7907419e51af508c6909e8d44c71e3b
Commitment
62e835fd1128042c73f691a729b01b6ac28c5038d9aa1be205b3268eaa58c330
Range Proof
672 bytes (Bulletproof)
Memo
e7717a7ed8f2ec14ce668a2b983cf6913210b38b6978f78b2663192235e833a77ac0664a3a70e9289244f9ef6d6c57dcb9a15a7d001f3832fece1706fd5fb22f12d0d4f279c378f94c733479bab82368bd9a704c7d2560b25be8fcec72eb53c0d721f444d3662fe8ce5b56b8a64fb46de4a7eff0cf10768369d3025221f91ef2 (encrypted)