# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4fa5d979fa72f62272a04400b85066d1295ffbad6095d650a14b165774f8a5a
Pseudo Output
244543153fb715212bf0fd4b13aaae33ec72ae795312014d9029ee9e424f9f7a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b0836c17e0d5e2dfc17af7fe944596600cf5d46cd22609fb677b2df379a46216
Commitment
8c1f1a67f9a674e4f7724b61ff47b86c5579993bd01dcde0d1c22656722e9175
Range Proof
672 bytes (Bulletproof)
Memo
ee5a9593489cc16cb3d609dd89cae39290816f9dd1a63c4175a591a1087a64f26c3278e8505c1c7bcd097fba47d309793eafa0cce809eab44c5319641723c3346440111c739920817185a79ce6d4350f2e29d8b2019f715bfc06d48f4a659caf6f840d6dd18382060f47caacfc3fa172ddd13f5ff45a56c14415eb3866898fef (encrypted)
Stealth Address
4c75f6d70c0c5d13e63934424d128d6641056b3d68bac576890f3a27968fa26e
Commitment
7ad857e8192dafad1e19a452a7390ca7d2febc419d141e313bd663e71e8ffb48
Range Proof
672 bytes (Bulletproof)
Memo
20a3f843e4e3cea396cf8ceea10a051e18d65c001bd231a1d6e8fbfec9462d87a3837c152af72b9a154a1a25b3d1baa76b040acff684d5942be5c40ae492e195a17f81b42faa04638ad9ee7dbdfab9c3117d2c7fa2e1b3684744fe4f4b22771e673637cc90b69602430090f8b7033603a7565a81dfc86a082100977f9eba7062 (encrypted)
Stealth Address
9a0a9d4cbfa772b46fdce7f53d680f81753535a7031081a21e4c14ded8d5fb59
Commitment
bae426e47eca45027e3a5b6645f62fe46f54a35686090c2c031155164c5ae42d
Range Proof
672 bytes (Bulletproof)
Memo
b6da1d26af10660ea557739a7807fe652565f565fbf4f0e7b2d370ad09411c435ae80154641150fdaa1d3bb0a177452e229e44656a2c154862e9c454c4172dc5c24f7b0518772692a6c93bab5fa65550e1ba40dd3f04773a8981b558bf97e0663a0f5941a01e7a772d85916c841744b2085e84cefc4989f94ca92f9d5ecf00fd (encrypted)