# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
521645fd62c5fd5d9f0add48315c4b2097d20025b0aaa03246fe1483777fe62b
Pseudo Output
2ed240068f160c241409c69f791d8ed2e69781d4bc7ebee7c7e0968a5cb7352a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e17bdde0004932c4dff892e919e027a34736ed40213133c9f8f880f624e1313
Commitment
824b3b8d4b26f552bd12b16edc4e9b599f8170884f20c63c14373d902656031f
Range Proof
672 bytes (Bulletproof)
Memo
774babaf81939a5780b89111542ea43321370df4c1b2ccf212de9c40830f874dd1dc43486fbc30f2811f77758a83da44d31f93bbb85ca2cd5fc8f167fe2f920a62f223dc6b3ccb2c1f9d9b49e79b5778fab9361a84d8524a233892ac5d7c1c296183e7dde288e564a492239b3217f387ddcdfbbf95d36fe4733285034b382431 (encrypted)
Stealth Address
a451ae76fbcf72241337f1a6bd822cf9386be7798fe105332911a58808719e19
Commitment
fe35864c158580158a609369b92fe00e7a93d08bbdbbe9c3aad990d12e2bce23
Range Proof
672 bytes (Bulletproof)
Memo
ad47acca7a6eac288aadaa50223186116bcdbdc3de247a2593e9f59b2bc61fae8f3ab20c49b1f41fde6448cedfefa7ed35837c520bc2a0073bedf1ef80f59240ed62995bdfba7d97e0e6bc7afc67b4aae2296efdf208fde688760acb94c93c41cb7d404eacd186214098ecad639ca886f90a94679c35e682782dba47b5200350 (encrypted)
Stealth Address
701d80a23b58b8e018b51e17c7a874647167c5fa3e9857b684676289108f6d54
Commitment
244d9c19464ae62bab9d6b8a3f5fba84aadbbd3014badd65ded09a8f2b816869
Range Proof
672 bytes (Bulletproof)
Memo
3b223c015f098de36ef14680c1da924c80f7a300a24b39bff6f57a511c62baa9586de386caf04e5b7eb0df99c82dcf9c73caafe2471f8723b4dbdb182326c761352c172cd803cb4d5dee1357d07408d209a072f414f47afeb56031d47734816a1a5c8e790252d2cf13e3295c01d1228d137544e95f5ef0ab87ada9ac51cc59b8 (encrypted)