# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12b291c443b8095b11126bcf0eadd9893705f0aaa2124f0efd27131147240508
Pseudo Output
0a834ecee66fd6f5d512537f55f98a2c13d0dbdde8c505a43f29bb372de23102
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
446e99aeb2471cf4ac57359177f24538ddeda96a461a6db455f1b81697b5a509
Commitment
1cc40a37df72d77c1cadfa38d0e1aba263ce9ff85713c7ead6b93507fed2511b
Range Proof
672 bytes (Bulletproof)
Memo
d2723eb6673a294579747d91b3723b34b302a0d1d959b69febe14a7a5d203c649603142035d702acb7e4f9200afa77a31d92bff563b32a4676f643cf30f707271c68f6742ae2312ba6b4330c9f7e7b4106b519be77e058bc8c1332d90756d3e04b0754e44622bbd2d173558ccd1fd795aab16d8c0d71516b5eead8472b7c2288 (encrypted)
Stealth Address
f2d55531b15385f0fd8c5dc253eaee861b530a784b5c830086ff5980de8efb50
Commitment
2c36a7e260e6765fd56c494e65e3650d980b1f08a0f7e816e30c01fba2311761
Range Proof
672 bytes (Bulletproof)
Memo
bc4981feb6c683fb9678e82921523fbee9dbce37edfef7cc5bd0a97bb5311a7760c84e2f893353d9bbdc4698c5fc47da312ced088daeed23c25fd17dd93ad0ee634d566aa6f4c8772baf65de6f8292d5b83610241bd858ec6b6078462e541c3df0f8f0b73afc32cd176ddd3f73a66ddb6295fe3af19080a2cfda6f72ccc42461 (encrypted)
Stealth Address
ca0a86c8e1234d3caad77624ee1b86805edf618184ce560de1d204e331277271
Commitment
4a97343b744822ac4cac9933a153d6a61375518fd40872d2a988271dd779b956
Range Proof
672 bytes (Bulletproof)
Memo
91fe7c0ac668fdbbf55eec2482209a69eec06556c5be47f4577ae00d47ea65438258a3c6b384da5d17c70aa926fb4897ed852581c99a841d3ce9117c94b80da0f420c5ee0de7b6311c9462fa59884fbf268fcbbceb5f0015ac2328e9be56781f8fe9ec8019a4fd0d1e7a1030b0c85787af66075e18dbb742f9d2b402c3c1d1bb (encrypted)