# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32e5ca215a44a0136352ac814249197e67466384387f0368d1b3d2040df84052
Pseudo Output
8e2044826907ddc08618b838b852af4905c6fa8e2ca6d259c0335920ef25ad40
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
92a326db737ab2f3ec25180f9a3380276d884e4ef4406088284422b488626351
Commitment
8293daf0610b22c67cf463aef74788bc0d08039e14237b90d0dc908ac5c0ce58
Range Proof
672 bytes (Bulletproof)
Memo
eb6581c2c2825dd734e99c7a312e7bd9fa7e1f02a863b9619abbfd0f4711637e6169f9e35fdcdc6007c0ef387dbc54d033d1b77df862ae8c5879b56078af37073405ab24391ae4085a7e71d0a39a199e3d54f98d9d649a1637593a50f01cea48f9296bcdf67a812ad914c9666b9c9d0ae0734ce8ef8484972af2a9ffdd5a07b4 (encrypted)
Stealth Address
d46dd52abd19eaae2be989c39c9e36d7f4240e23cd8cc76c101fce30fad0704f
Commitment
384629ec1a92fb8ab2c42354d3f9a6d1c84c59541593d80b86155226c1354a4f
Range Proof
672 bytes (Bulletproof)
Memo
6b082e0959e55009e8f1d40a0c1665dea30264a03125c23070a3a15af7004250d849c27d01e5c08038d4604c69a7fc2947964d514880b75f1ec29c553d5a603dc15ce2e2021f28cc42ae5527146e705e18886e58b5b0a292f31fe8b76ceb965549eba1975801d2915a87aeb46e184d20b675d97b21b7815b5413076e5fb92042 (encrypted)
Stealth Address
54f135ce7c504d8deee7a801fc534a993b9bc6d5248f386d85a56b689a318623
Commitment
c45f84e38eb74f5c64a65c1cd2555e3f7851e6fc9266f2affd947ceb77ea8c35
Range Proof
672 bytes (Bulletproof)
Memo
9e204c41a0d8feefe89d6e7a949406979f4044e39abec4ca526b9c7640f05e4af45e968e68ab272cf4aa8214ac3c0d07957b160ea8160d6842f95428b2c2bf74ce3fdcfcb14a5eb432efa96c49ccd956ad0175e862c17fff4094defc884daec76aa7810ceaf3eb76c0ecf8af9dcc1e5595526e9187176ca40c4ca38685933088 (encrypted)