# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
028bd8b4e7623d1d0c994624637b7b7ac7f1a04e02fc69f583b5545f58d5954e
Pseudo Output
2834c75c32e487afe771352caa3103d5a23509b093dedd205fc07c1877f94834
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
00e17a747d07ad0d71c6ba0935a66862aab720caa99e645103b00d6c62ba9e5a
Commitment
f8256f3aef5b2df067bea08441b97c20d3994f6a08215cd703035ab8d7c21e31
Range Proof
672 bytes (Bulletproof)
Memo
86c99f12676a1bf1b03b6ce5023b4644817188fc75034eaf6c67da5aedd91820f3674757e4e9df790b2d45044ce2fea5e81575096d54d19cf6f39d664ea27fbbc1f839661961040c18269df8ce8af8248668f8bfb3f88307a2b271b48d0aa5b9ba9081090563e780d6eb6d59d78fc332297cdf9ca1f2745b5279298811f3b48d (encrypted)
Stealth Address
e2ae6b49e240a91898ae97d3f19103694a41563b4d5a7bb286cd531b4f891b36
Commitment
6c5ccc4a7c555c5a44e552ee62544439958aa33a2259b62ab8c857c8f679051d
Range Proof
672 bytes (Bulletproof)
Memo
3b8e79a5b7a83690a108273507d1f564f435b9b09cd38073f40c4517682f7a1f57286bab8e7349eba7147ec5839d1e9dd267544bae4f6b7ceabc432cbd0b9975b754610ce3dfefab27e0d1c69b11c8b442d16027233e20f0ddcb6463b44339f9f9685d37428f6d30562a8f525c956840bf0f0ede7a3dde113562b7861d3db216 (encrypted)
Stealth Address
2a39b5b5efdb1a0de56d10d2246136bf0bbe4a6001c9acf7c1bbc07fbf9d6449
Commitment
50dc74e6ae07edba6e7b2f2820af77a5c8e4450d23fc2a427036472185c05066
Range Proof
672 bytes (Bulletproof)
Memo
80f5a0fa834cd6a7faa3c24a64db327d9f6b0e6c7a4797dc2d9419ea51493bb25de25bc21191957fe668e23a0ec04974d9def3b4749a521b92f998ea2dd4b73fa924acee35311ec1f4533141af289ef6342852381f9cbc596da05f5dde7f71f7808d77840db9cd0749e3f5f6d323a648f88210d1e9d443a4a0fefde892559237 (encrypted)