# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e73935ee206d622d76dd0e010fb4ddf01f349b6c5b664e332dd11542045714d
Pseudo Output
201e28c7e27dedf92b5f783d211e0e747af140c705f5e5babb88d93fa6cb0f6f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eed503b74c88dbc5eb006255f2830038a8aff8405b7c12571ec0c12c26b4145f
Commitment
6ce469f1994cfc199b0d49f6bd952ca47381803afc18cd57d7f810b7cdf52359
Range Proof
672 bytes (Bulletproof)
Memo
5decc0d51c11b132ea06a10d712d0ef8b14987c8f925f3d244f364f3ee5e87284daa35b0f8f04ce7241dd435eaa5c88c1a9b81f065197927d48c27852a5be2f36fe50f9b224b726e7ddfdd3aa39f677ef8eff4aa5f6b667ef659014a790393522f7e82085d0d618d15e4bdfb636eda59fac8a9ee84beb79b0491c1b8389d2799 (encrypted)
Stealth Address
1e7d6fcb54d90c2d21d7e772b555c429e37ece14e6d4ad25740b0093a6f08432
Commitment
aa83572bfc2111d27af357cfce41b934538c091cc84c44a2995b32d52d5c2053
Range Proof
672 bytes (Bulletproof)
Memo
e590a2f1e67dfa81f30ef3f1677804582fd0ac2e80c4e3e858f527008978ec276d6ca8d5f58ba0242ad6689315f0da2cc4900ea827e30688117b2a8c8048d63b129980ddd9f559c1860e67c65928c34ff0e234c192fa40a533891dd29e2941b0af7fc4d5486e5f2796662bcafa95405ce8b6c0f9bb5dfe0425648395120d995e (encrypted)
Stealth Address
aa5af27114348023fcdc7cd295592d45c421418a28da929d5df4cb8fc9bcbc22
Commitment
ca51129fc6fc88a8bd147baf950bd398f50ea2b84c494548010f8bd4d848264b
Range Proof
672 bytes (Bulletproof)
Memo
b32ef73dc9e4da98d6249f514c542e0a04463b34276fee584235544bbd076712fbe49d7de3e134470b14916bb5a245f7e4e87b9144516ec58b219d168173fa5bc9e435334fd2c00a7230ca8f2696edb32b8b5fbfd3e7c91d504355810ee202358b5bb5c490b9501f892512071844a9166b3af7e9cb90f30290146c3b59c188d0 (encrypted)