# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e8224440a3f2938486daa7ba43e8a57ae74c02dde3dbcb302522d67cb49d755e
Pseudo Output
fe33ff0e95003a15f74452fd018ab950139a5b1a2e7af6c4fac016383b5bbb54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f229306d981b2bb04a3b1671ea7deb5eb8479656ab25652ff1f28079a791ea34
Commitment
80874046ce4d262680864de4aa4d36513c994ea5be874c913ac519dbcc17165d
Range Proof
672 bytes (Bulletproof)
Memo
cce45d0d14bbb800aaf24a18edec8a8607191a105e0df889aa5f96fc9cf78f86d96588d036568de7db327bc2401f4adabf69513b836c7532b967182d76f476c9f51e517bccb12c68f085595f7fdbe4855b6a154361823300d37e352bf3313a565248eb9a70b7221fe0400efb822f8de1ee12adb42cfb1fbf01e102bb1a2187e9 (encrypted)
Stealth Address
c25dd7397eb5f30f847e7f9d28461e0b21fa6cd6da238c0f2578e7745b147c1a
Commitment
00b3d97c6d3340f9315ddb79cbdd432d0e510e0c3a1b73943c202749698ed801
Range Proof
672 bytes (Bulletproof)
Memo
546bd3851c3fc57b2480d46e5d6136957d1aed3798c34de2101d4e13344624ebe72bb6401dee5070d069c5b514e7e7b0883b3bc6e49351722bb2c505eba398cea756d7215e777b82c91216230bfa5a2bd65b7c475c9fe18e141b802d916df634f79d56ea040431cc869e7ebe0a580181f76ad4feb99ea638e4129ed7ca390ec6 (encrypted)
Stealth Address
ba22f93b9fb87a7c883b9e72a2898d829cf050f82c0d36768c7510567bcf0b42
Commitment
9ccdb085eaf1710a7ff75463ef4a071c6f629d823d4ac031823a839da47ecb54
Range Proof
672 bytes (Bulletproof)
Memo
0a7a5183c0673ad98c6d4f729eca9310ac67554285076c915f56c14dcbf2ce024514504afd2b9105ac6b6defd92c30a805fd304bb8954f0c00f97b3bf61b305330a8420a3a80ec5db5e2a3759a804345f91aedf6a4509364774578b037db0107860bed0e3d24b95b3967be639f9f5f2e3ef1abda6854ad7583d771d3739587fb (encrypted)