# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3c674bffaf48b4d09610853a7af50ff84cbc7e8109cfee39687171fb416c8935
Pseudo Output
841d2a5135920e388021149eb0d10f82ab55f26c21050539df2fe4083c733248
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54071bc6abac946286dcd0a01d00b9652c57b438df22ba800849a9a84e965211
Commitment
d633550797fe340746d220af56eaad876404eb818e499101e29d2699a147c025
Range Proof
672 bytes (Bulletproof)
Memo
f1402e5120877f62dd445958ce60977389e0b5cabcd72d2b762018e6ff9610cf26856c171646ecc6367462f11c8e0de0d7505e5515ece75c8e83d5a5b134990259eedf5627fc9e94af17b43d1063816d839e36200fa60632dfa2b29dd60e1246d9a02ece3d7a16593b8d9f48e5188aabac7772ae7ef43b1d49f341d2ad8338a9 (encrypted)
Stealth Address
14b1ac90efc796751d678da4f74c4b4ee59a25b00159dab37d867a6b837af840
Commitment
b87bbe41138d0ee5aa6dc1f6075e9eacad89d379be72a46e2e269e7db0a14109
Range Proof
672 bytes (Bulletproof)
Memo
155b6d0fc02cf1faf955174473d0489b6c1ee1d562224da32ac6398ccdee24d724396c06916082bd0bd6b6e227ce4129a7c4d3d1ca43abf1a2a8068771b4f8dd84003b6d1dac77ab6eca71bef29da0c4fd6bf051345c5bdcb7120e0fa3ae3dac08e54cb08836bd707fb2dd280688aa05571b983e7b3ed4a98f4a507334dd086e (encrypted)
Stealth Address
aefb65ae099e4b4b4eb3d3f68bbaaf53e2a615606b0c9d611a8290155766f46f
Commitment
4e854b97579fa7ad355d18607ef8d7e7b8688e040fa880c8f1df8bb81f2e8924
Range Proof
672 bytes (Bulletproof)
Memo
c19bda39267df4a83e8e8b07249d50c2fb48a2801a972584f5b1597a664cbdad585b0f5ad52a5eeb2fd14e279368774c07ea96e1eacdf43e51d2546d5951ef4e9bcf6c6cb06e3ea27971c4a5ceb59ce2996d41717441cf1d355b0dd35677bc5d0b1ef223bd8a37f8aa6c31943c36e188822202ab54fd9a0667fafe79ef870208 (encrypted)