# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
04fcaa8e08f084ec4ce29bc764e04f478230b324cbd48c4538735c2e27389708
Pseudo Output
84f7a74440c6d3c4b17b321c9e1365d25b6c51d65a691be927284f41cb62454f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e828ee7259ceee9b7c3c98de1854cfd0d3a58a845fd0abc2e45b5c068b83342c
Commitment
42b6e0b2e60b806dc7abbf29920e5319c4dadb6124a4ed1dd4d0312c1b2e2467
Range Proof
672 bytes (Bulletproof)
Memo
638800e184e781a3d8ae1ada892adcd3548d9d8c63d01a2e038d2af53985e5171fb7b7195d60cbdb4033c885fd9fddd442c98f92926fdedae5930b921e88937dd8b9ad980ee71becab5b5fc3c7ec3c2d4041f57312dae26a4a73c874aa194241719d04964e283d7f01da3b5f3b809cf69d6e5f49adfb8948e1ba2ec5ada206b4 (encrypted)
Stealth Address
d293be1c9f6fbb1fe5eeae2cb615644820d92e7316f052b06daf4ad82042013d
Commitment
2c000f2b965ee2fe8402d04d01f7705845a3e811f70b85d305ccf6088910bd0d
Range Proof
672 bytes (Bulletproof)
Memo
d020811dc881de67d631436664911bd116a3cebfa92a548a11bce81858ad6fff4aaa8114eb31083e14032be3803230193301c22b3b38f07adeb8eab3063aa41bf6ea910842362f95cf53bb2d818686be285af784d762a1e4ceed243cadb2bf70f32e6bfe4e78a66310fe107a7a336ad282cd467fb506b3809ce0c2377a7a0382 (encrypted)
Stealth Address
d66c64978d7d97f5f696b667aa4327b9a3dfb737d23c100b5f0f4ca9635de902
Commitment
a663cae09930846e736164fc12f10e9dbb36f05e599ad315c9dc97c16f7c345c
Range Proof
672 bytes (Bulletproof)
Memo
af2389b7e68fba359df0c1c2d46a2b41e3fe50f014ebfe2aa1f57ca539549fd9b7c5924a726b82d6bbc6f0357c6f7dd27339b0567be64b8b4b528edd7343ffbd1a1bd35b16d0b674ea9aed2d2a2d57751668a59bcc829a1f6ae5c3b35ad8b48c8313c266abc358e5215f507047477d6a0c8d84c15ec0a06c04a23e64e81cf2f6 (encrypted)