# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
000efb968625db842712946833bc01720a2d99ba711f68e1aa18ed86b990bc41
Pseudo Output
6c52a8c9a0f46b75a4e89f17d3a46b5e5d11089989f0fd08c4bc0fd8affae464
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e675a377f7b653adf5d95fa20f999469df5253bd7b8e36c98beffbeb7c9c7370
Commitment
369bc2682665b32f148e5f8937d9f5b48830f05da42aa506f635a3ef9053fc34
Range Proof
672 bytes (Bulletproof)
Memo
af43578135c09eedb26642703f4a5faa79a8e5fba24cf70168d81d714b10651d9de06bc99bf341f85c73f55849ae61796d4aa3b28cb8516fdbd3466e24e6a05f9a9d4948ce82ce89411fd6eb009bf9373dbb85976985d95b8b2193e47c5d2c1d97c162f7633cd80f5df61f5b4bc417cf43ed8203062f62874062d94a3ea5b77e (encrypted)
Stealth Address
fa2acff1a46b271c8b040b76c4f8a32c00eadee01417f960640e1cd90294442a
Commitment
f4475cc5278d85e0aa713dff344cc5b7347dc69a40ee7c80fe813c844068fd76
Range Proof
672 bytes (Bulletproof)
Memo
289b78f061267ee8f2d401fb9401f6c49598f009999c49b84da08ed7e77d40dd10a4901ac588166f7fd3432f85f4676d341e68f853590e22cac662fc750aeb9f49749a021e4fbed7de08a0a80f9aeb72c31a972985f9abad09b899c9df441674f1018b2860603497341b6d50029d997c248d655ff973fbebf6c6d3717f0e29d7 (encrypted)
Stealth Address
f849868659a2076812c567aa42e39c07ad2e1a9d4892c682c175c76c0e1dba58
Commitment
7a339cedcec9e8e82507d5220285d756f86b03437ff9fa67a191c8d659d3da4d
Range Proof
672 bytes (Bulletproof)
Memo
8a0a7f98c148b6b2bbdab507a2884fe28fa65388e300d37b5554d661f66e0e6d4883fe162869496ee0f428fe0d7bc2611e61b3c55df2145167216809e2d4e377734d07008710ed752de090bbee702b4ca0205972acdcefbb910e8081aff5efe012e74078307f4b016d67f940cf4c9093a8da25f21bb31274570d16a745e17431 (encrypted)