# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e82403be18b3be84a955d6950234f60da373170be9f3ed61150e0dfcbbfd1335
Pseudo Output
866c16e60e07acf3e4f7b5b3c80494f34ba7b89d5199c7570f8fe2a11519fd41
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e0f3e3f036ab3c10a5cc9d7f0048b1f1f87350572d312151f9e157579460040
Commitment
e03fbea906aedf07eda8c2e800ff3ba73962209882ded775cabfa2db5c690424
Range Proof
672 bytes (Bulletproof)
Memo
4e4a663c99a12bed748b28739f52cef29f4a31928cd943bbb1e925b00700038a5ce1d9c5f1ca9cd245f1b26d459bf4e4422899bd1d5dd4019b338ea0cbebc83e8f199bc0b5093fa03391e47114ef1bce8125726f4bf756fe58e2a701b1e72c80363975d50cbf885d67789d3d7f9f5fb8c44cc103f3fffb88d95e2259e663bf69 (encrypted)
Stealth Address
dcb47b2fba5a1f095375fac488ef32d81a2ca1af8363c7e8f4dd7fb7e50aca2b
Commitment
30b3b64f1c6d872f6426543ad56f469991452c0682c81c5304752281cf28aa34
Range Proof
672 bytes (Bulletproof)
Memo
b5b15853a84e9076f6e238f909d1451af21c13dd7dbcd21e08953d8ec1f9a0f23ee3f98ed4a3d597049fcf4a651dab530040ee372822ca5bade824487d2685926e08ea24c26f195b185f100be0d4ed4d35978dd175837c2f92b2413b85899eb706d87b5a3616d121400e4c759b9524948084658ed2a6e7bb9f9e4252bd46570d (encrypted)
Stealth Address
840153827f4ce17354cf9d0999fc4ed563764d3cf5cc693dcdc93695c0452500
Commitment
8220a4e30d3f40368dcfe5fd4690e0b54f0f10dd7a2e2eeea80c279115441a5e
Range Proof
672 bytes (Bulletproof)
Memo
2b06c4412cd4882ecf153b4662106425bf20873bf005ce8ed6fe9b43fb57ffc2f81b17cb3648b942811270b689cb240be97a42fcc4e8e02a2436f8bba4daab0fc98623cdf53b7b0e06b798706f15a0a6fce7494feef65bf2f691141275667ba9352957e29771634673a9d6d8ad1e0e9718ae178df808444ba507fe37b2890ec7 (encrypted)