# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e8ea464c57c8ecd72697ac8ac3006432edae7cfc0d56075cd4165b00c5c243f
Pseudo Output
7ef02b802ae0a15ce2170822cf670bd918b587209454eeb8e08fd314e6dd3840
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1484f7be341ff0a697197333d24b56d060b8933552b263cbbc80ec7c765d352d
Commitment
860954635a37bcd71bd96346720167288c41289f8f64665c07323c08d6e4cd79
Range Proof
672 bytes (Bulletproof)
Memo
f26a0c127d15a4d1d2dd5341f14a6e610158fde59475662065e62a7b3d04c6a23ddcd639d461ebe4a2eebda859412e90b3baaabf89b32c9e5e3bd011f3112f49151b212c9db59d377de3fc273aaa7ee7b2132aa9ffe0f0afe5780b66cbfe0892b936ae856e084600c8b85bae5b58bf6775d475769fd433f0bf88f02380faa84f (encrypted)
Stealth Address
766e78b72ca5a3fc4351efb5020b8e355aedf5f2dcdb6ee412bdd791f6d8f919
Commitment
0262dc5d079a718669737eb8bd23892764106c1bb208d9d8137870903611d663
Range Proof
672 bytes (Bulletproof)
Memo
28ce5d66b6415d9bdf7e38b9814266884ab51818a0ce8f906b5f9e53b1c3f4e428226ababa141cd83d202223749082ac94337d4b5f84ed6953caa914df984b5bbaf492506bba51cb379fa94c021f983c099b59311967a4d0b1b143ac5a3c7725de0bc54c34ca809c54e4d1fc0d9a817ea998da757d6b6e148b137aff530b3d86 (encrypted)
Stealth Address
4e28a421fb7b500c2eb6aa81d67cd954e149ef9c18a77a1135f5a5eefde83807
Commitment
aa76a028fabd72b40eb4166eddb0d83443603ef7c9fd4ea27e007fc89e1b2a27
Range Proof
672 bytes (Bulletproof)
Memo
4e6148adcfef265613df9febba00ce98dba7c909b0e62898303d486eba41f0ebe7eb49b30f9afb5319976fbe9ca571eb2df2df6aa17c53c22918fe9f8351a555773b187c23e52212c4b34e4fc4d2efa4d6abcff8651cbd49d51bac9478069c02ebc8530ae41ffc0fe7e44ebd13b5bd5a56d38b97dc62367c22ebe50570fc721b (encrypted)