# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
043ba4d44087e24cc52ac8abaa642cad3f25b885dfcdaaa0eeb9a3c4fe0f5704
Pseudo Output
1eda3b7a71953259aa8849b40cf70acee0050ce21d1f124f8cd78bfc50a33f00
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2235e53c68ec213f4fd5cb1011288eb87758e18e809a5fb51c4e3579b4fee503
Commitment
d8636f3a22c3874f9a2188c0ec85f9108a8e32ecc5234fa3936d04fb6c9a1f55
Range Proof
672 bytes (Bulletproof)
Memo
441edaa4e42848287723d0c65334ae666a6d19d760d34994bbef251d47c28bc9201873cbd3ff1070cccc983280cee31813240203706af55b36c7b5cc8349c84c72eae3d73c84ca9142e4c0505aaba415f5a6f8eee76888b8edc11531b9e8e14fb2a28f5e2284626ca02a055687f3c345cb7aa8e6f31d1e26469bfd927c2e213a (encrypted)
Stealth Address
0cd295c40c6907466667c03ec7c690f49eb57dfc0dc1311e9d31fa8b4ca67d6c
Commitment
4a28160a9b7d9902c498f5c362031b11d9e54212dbcddd5aec62337d8597950e
Range Proof
672 bytes (Bulletproof)
Memo
8397968543fe3fc0d092d72b62867cb6215b24d2d5c9a09a4f66049dc784920083e3ef97d97090d1cc0bb2f57f9f9c38263a76d845202595e6219d94094ea866f575f51fa415c7677c24f53c923472743d0af5abda67f45ce04a4329e1832bb705f170558236d3e75358f0f74e8eaa548c554673d356449c06f5a7a5438620d0 (encrypted)
Stealth Address
6aec7c47881490c96d9bb406908e77510d5d67ad5633285d5e708b35fe057541
Commitment
5ab0d8c98fed1e3deb197ce304b0af13086d34a6bf590828690c3ab9c3517668
Range Proof
672 bytes (Bulletproof)
Memo
127ef0179df748942d844a44fe2e1f032b9ba97273a14dc6ecbc9c79919159389060787e139f6d20c81b36567c2fe6ee7bcddb6f5acd571e944c127713cbc13d351b63bc103866947af48db47d2348acd379e8d7b2448fc16d3babc06bc81f5d79c193305e02a797e840208d992be07af8132bd5253e741dd8e2a9962228febd (encrypted)