# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f89d23c8e84faa330e4c8604df576098b4fc2dfeacb7148161871f7b4a8dd107
Pseudo Output
f0ab16ba1c1e57467bb8d52b6f96b397a3427d20c62a72d3add3ce7d2850fa0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5a77521a07673c87cd38bc09f8ab33b2656c61862d2b70558d43b4c8f94c7138
Commitment
b6b001f32fb7ba98894400e4cb48530694ef9d18078598b41e8fa55af2a90431
Range Proof
672 bytes (Bulletproof)
Memo
2b536dfb10f420862807e97bbd35490de51d81f4a633af6ce1c25bb08723253da6cc0df0a8922e9960c9df326e284bb0147bd9e497d192d32dc03b716b5ffa1785e836bc6bdf6c25394e95e92ef7f83cf90881023c71e5a92f42cea200a905d4f6d8faa160da9248b071609f20ada5f444c83c4e4145795752caf05bd5e99570 (encrypted)
Stealth Address
52f492eb2a9f64aa3250383027ede9e79e78df9291630422d54247bfc92f8010
Commitment
e2d85c6f966b72f26f1c503ca53c757f096d7dfb72f3fe5e718078b1bce3fc2d
Range Proof
672 bytes (Bulletproof)
Memo
963028f948a320aa3c4e9b51fedb266c3264b9549b9dbcd537e29793eac1e4cda5f922aa9867c476eecad328e2630529720bd424bfb53b98bef25d75c6eaf8427d85c86a9487ab2e15d8584ec1fe2868ca804e05106f8b8106f5f901246b34f04ca51c44578edccf7ba5773dffdb459e3bf69bce69a4cb3c12a06ea91469f52a (encrypted)
Stealth Address
c4b20b1b931f02f5bbecd1ff5d4f9e1b5dc07fe343eed101600afbc9609ba635
Commitment
022c3ec86f3af362fab407101cb3a04c6fc9ee68c6026c75e84d908416977f64
Range Proof
672 bytes (Bulletproof)
Memo
3d7784004fa327f74502a4ea7d0d3e1afbffac18be99f2d5ddbd4dc6ff19f256c71295762f79d7d6f5260a1d09bbfd9a351d4d865d5c642ba120631a7fbdb7768e8f9440df40f484909d2160a89fcbef5f6ffccfda2f574e306e1df294def69f5801f25460489e8f88286f620f76061b0a950e28a607b3a3ea6aee8cbf1cc920 (encrypted)