# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
36b2913865fb4a5275349f8de038dd92f546072145f1d3c69d4258926822fd34
Pseudo Output
f24f0fece28ffd89fde85db417fa74eebdaaa59cdb64e81ea0d1217ceaa51147
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a307aeca560190dc93c22b1b0022c3b2735fd3ede318ef5c29bc2a815016e39
Commitment
28313d45762e8f4354deee68a11e6c8f919c9d21a6901fcdc4d1ae876da4090c
Range Proof
672 bytes (Bulletproof)
Memo
28bf1efd491d90d0a32b9253d3b126c64de710dc761261592ca8fc625ad905d46218b71a2c93196ae554f3536fd69a82282c8d7c160e8422341209c40b7ec83cd64c89db393df5fd5abe6fe6accc2c820c8aa7ea7dda2183ae76d87c1d1040e29e760e493d3dd9cda2c6586f15f772fe9ed34a467c088fcceaab556f0e1b0298 (encrypted)
Stealth Address
34e8e01a23dcd0c5e07d1c1fd4ca1e0ba089aae5454c1b44bbdd45feae10be65
Commitment
2aece3be7c7585e447b378f5118c26f91db16df50eeb52ec46457d804197e00c
Range Proof
672 bytes (Bulletproof)
Memo
b73bf09b422957174f718661b24d8d13ad601e79138ff93986115181c74ce3bdccaed1d33f8e63ffe27379cac2969ad86ec0578e59938f60974baf375eeecd64ad99a3b26126709ca4f85fc02e83875fdb793ae63f94a280a93a78530a64aceebfcb5b2b29c2fbcf2157a6fd4974b7b53985ff4cd2b563efd3671f1f8256dd54 (encrypted)
Stealth Address
b0a9179838a606a8ccd9e662f488a50ae1c17ef595a36fc608b069bf69680e74
Commitment
8af852718e9292d6f837ac00d80f62a61a1ac42c9a9d7d17db70e3803b98a403
Range Proof
672 bytes (Bulletproof)
Memo
5d14797c77ad1b791edf97ea5f54d05cc1fa4755eb77a5ec567c5ffc92b0ebfd284c9ef0424dc6a935c9f85256d13aefe2a85fb9b039ec077d3d94d802cfcd23e0a5107210245db67a758777d82e55ab8cb8bf0af1e37b836bb7424752ca6f159590907826f95241c3479aa45be8be2f0dd5c295e91f7b0b9ba08136712b49e6 (encrypted)