# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0ba55ae3aa3b612be07a1e217ebfc8b1dfbe253cf26e3778e6709c350adc406
Pseudo Output
1653a83dc053236364970ebce5982e25d374652108d5bb2e71004a80f338f455
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
244bbe1fa13245f61c09864685c970a6aa8c2b938b0be7e9b4bebd877e634b37
Commitment
82b6b36d7f31591ccba3b4e2c02925d0fc37deb747d2140006c0d457fa627454
Range Proof
672 bytes (Bulletproof)
Memo
e5b752d777836c6f1bcf9ad223806e1ec89a2b8c1cec5c1f1270b1a47389f02fffae82ae124e47dffe50f23d1514b4d1a1d3b82cb5af5003832cdee2c5df0ab6045dee01b006f269e5009752ab6d55153c941467b495ce2896b09674cce60cc577a84838745a6597407fb4d7ae34ef522e3205f971663e4b0878ab92e4f3926f (encrypted)
Stealth Address
2cf52719ec43ebba72144e941801673729d6c91322a19fb2f530250eaf98a124
Commitment
6e4d9e95d2e7d4851ff14c45de0fa366a618f3c1d98d56fd9ef5176f3c8b0961
Range Proof
672 bytes (Bulletproof)
Memo
057a197886645a05fcf5c076fbbb0a30a001a56e5d572eed1e543c017304a59ef0e80c6fe3a964266738265ce16e436ec51024446501699017fa4e40b83cb74d35169eb401f20d7debce9358cb734ae1f97621f55fddf5a2a0033efc5ee4c64e78739efe20b04fa5a772756e091405813259bbe2e366f62ce13be60e17ce9156 (encrypted)
Stealth Address
c4c05cf5356238e2535b75405428e777979061a9af7933059304a394001c2e0b
Commitment
fee88a3fd152f7e7b9a8e444955a3aa1a863f0c8e7215891a8755f7565080051
Range Proof
672 bytes (Bulletproof)
Memo
9ff800c15c99d36108e42448bfd3a3178783c58ab20a0b73801a3ea31e569873fa389265366639c18719619e46ecf87cf26fe18ad8b85c265caf29ad9964f22a81c5930a2b2a20ee6c541ea6846575a14106cc2ea3f18f971c636a60aafdb0f1c4fd6967c090c53e790aecce2820908ab2f779178153d0b759c2f6aab376476a (encrypted)