# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
189978f990364b927b5c5be20da9d5282d1f5146fb945a61694b9432cc26197a
Pseudo Output
f67cf882c1fb164f0e3e67061454cf74a5a9f7204a784a018a7df1b38ace231d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2f8fbae36a7e3ef68835f6e2ce1b6654647ecd002cf3b377e4e6882d4d2907b
Commitment
88f72864f42ae64248eb77aec86bd960cfcbfe2c6f1257a5f2a9b29f1054615a
Range Proof
672 bytes (Bulletproof)
Memo
00a7892c98ab17a3a36c8a9e6289984fab59caa04fa90741bc04ca3d6f15194ab00238ee8383e07d9d594ef43e38f5b3f8278150613d6a112059ecfabe29a075f0abadf66d0ede5203af01c6be491c77a362b4f5d2d5465e25729f871c124031cd1864ce8eb3801302da7a6b0a171cb05deb1783b52fbaefcd8af9b0c98502f4 (encrypted)
Stealth Address
d29fefb2a212123fbfca5e370847fcf0797c21f7551c56eda66903873280730f
Commitment
26260778202aa11b18f94f4dc9b1fce295bf54ff6af092c1410971a97f35dc63
Range Proof
672 bytes (Bulletproof)
Memo
60f61a8526376f2c7bf7e85a165cbab8f6e600a6e8ff6a47b3a1ddfe236be766d174f990ac4380a1ca9b8fd18b4372cd7dfb480cbbd2ae6f41757f64b6d0badcfbddcb11e592a7ab651348ed8766849a453cf787b7534fcde598bdc212db037888b5ffe8ac2ec4d0e07a66ee496158e9953fba764a1902d256c3552b8ed80113 (encrypted)
Stealth Address
1a64152ae74f8832f0a693b009048e2265521a9199ef3604fc068d1574efa426
Commitment
f4faa419464086e5dd83147c35e7aadb4a2161ade7164ec06b98dbb1c4b4d020
Range Proof
672 bytes (Bulletproof)
Memo
93da96c59b2ebccf2dc07ddfe6f2ef2764fea1ca8394436de827558098e783f058d0245bc288cea881060abf159b0449be0ae97ef7571e294dd648c93bb3ee7573eab6a97d0e954a3140a294ff2d5ff68afb10dd6b1b0e2349a862e770e1a37f15a0185715577a304feee92d0d5c08746d470d82de03be32a95f968085e5fb60 (encrypted)