# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
88953913565357c851303f17eba21c09a9e1343ffd09c34a456d299d350df01d
Pseudo Output
4e63298d757c513bfd936a0d79da85687446ee522eab1d5834ed747fc5c8ca25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64f980050d23836c18e59aece699223cc19df0934003c1ace8f62c21f741c470
Commitment
2879ee8ad00db3e1abbf6108fc593bbfd7dd117861122ca88f3fc2e86316f607
Range Proof
672 bytes (Bulletproof)
Memo
5a39a8f14280d4fb8be787986c1680117c48cc33f809deb665d7289728ba46dcdf07ba821a63e2993174e983dee9f6606589f8b5afadfd1201701e3571820b7660f744d7679cc614fbd3093b24585abb92b9f5c051b2e5f12a8fee4c5c80284db0331fe9ee63fada3f594f9bd3e277eb94e73503a4f6580279f91f040eb7018c (encrypted)
Stealth Address
2c03e16fe47210cd0749531a2a2fa7421180204d1fdf0707142f3b1140b6780a
Commitment
84d1723ef0153110806b54997f3699b23b34f13465addb61e51e46bfca7ee07a
Range Proof
672 bytes (Bulletproof)
Memo
28fc14ec53fb9e1105e4b78b82a2281235b82b7367cdf3e41c9ded181420aa1606617921a74227abf327c07c03167cff8402bea41a2108401649d763a2057b76b9e749a0cb7a33e1f97df47288de538df4ed087e7b0a72bd4926ac8f81592e690ae4f36dfb4cfcaa643a27982e8d598fc465d0d4f2642c28aa0b622b340de980 (encrypted)
Stealth Address
7026a029ae85f3cd335326edb3d89901c1a4cd523583e9a25d9689ef0affb96d
Commitment
04fd86f31c237619ad14bf6a207b5dcce4b77513cc2d163d9b04ae69068a901a
Range Proof
672 bytes (Bulletproof)
Memo
ddd78d154ef62a58004d5336e0a5a822fafb1e2cdedfd2dde26a56663898da8dfba4ea7498acd1625cb5440be83b4b2846ef8b923551b7836950d2ff00dfe224d2d73841c3943d1e34ff36185fb560520de0d1d57938eb614e185894034d8a7ca2a0429b20f6c093aeb62fa26d97bc96f8748926a0e3e22fbe306d679d4fa255 (encrypted)