# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
867b2e1ff0177eff055d803ebbf4a2039d770e3c6a8e1186a046c7eb59224025
Pseudo Output
607bbeb2f3bea04ef908c542e1e1d10504f16185bcf798dcef1f26a7107ed642
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
303c40779b8c75c316bcf930626c40194ca458e2d8eb60b06733b31f96115761
Commitment
ee6478d35dab6a408178dbb1ff6f01f695710915dbb4de75947d90475270131a
Range Proof
672 bytes (Bulletproof)
Memo
a108d4e2cfaf1afee16a03b7b1d896f49954d60e9603dc4c840c3b0842cdcc93f2ffbc6f7f25fb8d93b23ef48ec03557271f0f5c39166281b852aa16858d502a9ddb2f5e97fc48aa30b630c7a274cfc565926e9b7d88197b9b6a155dc274fe8534a1ccb661ed5fe89ae75d36b27590292190a4a3b6b726fb434c2603a883d357 (encrypted)
Stealth Address
902cf49cb7c3b00696a02e439e12aa2b4f725d82702988b6c0bcc724fc53a32c
Commitment
32ea1923e649229d9f254697995b47c2a1bb458660dabe0d8ac9608378efd540
Range Proof
672 bytes (Bulletproof)
Memo
fb308ee40ba7600c90af2ed868587c810ffa51e22626f3d25d3dffc4af1db28a07e99ccb523028094d4a46f05fb88721aac0ce7664b6db8f4813cbab60c956e250d640e99feb4c6140e4bd3c032c30e3efc1d2292e469c5198382dec3ee346b0342bfbee7a3913489897bcab2399160b5668097ef42298a7f3f3f626f77608cf (encrypted)
Stealth Address
8c357848ee559b74a7a6bf40ec742065e44d4c5dd4524b334d108634bdd5b020
Commitment
60f09bec25bda760a560888fc580fc3cc515e2699572c5a26e06d9f70847c719
Range Proof
672 bytes (Bulletproof)
Memo
51aaff61d16eff9245753bfe61387fa9ad4150cad83320b783c974b3a64e1fa5e00d0199b18d6f6ea28158d2edac8c039150a282c078e73597255b47f0fdab7caafb2de5bcfadfeed6989855b12359cedd7ed5c6b8764a468fe3c88b20dc9bee20ce6fb5a918cc2536a270e15e19b2ec5a8089b3c8f663f409455926604d5c52 (encrypted)