# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f61dc99fb424cb2d3ec533dd87c86b3c4f6a705a34cda92a5812cef1eea8e376
Pseudo Output
e05e2c271945f565080dd3bb902121f8cc10a193bb18e277c205bcac98b81004
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f42aba2ee90a532ef197b8bdebc148a62c1bdd79612fc13f99195d243f191330
Commitment
e0909842b74345ae40afd2872fc8b06b008a1cc4c5093725dfb16369b8495b7a
Range Proof
672 bytes (Bulletproof)
Memo
38d1237eaa2fc12cae2ccfcf0e022b5b39d2b1acb812f6bbe30be910ca8243a129dc8acfabc05eb3a34df8a5cd16938e9ae05c40634ac43a07c4780d957a9b685c0d54250e3886d7c22723762595526d32b16067c69b70eeb5011e37bdfc6ed7bb9ce8c93adc6cd2d67fd4f70016cd4a9ccc6108095d69f737a6aaec34b3369c (encrypted)
Stealth Address
9430432f0521da01357aa390176592ae6f1c2a61e1ab5104ebf6e97854a10235
Commitment
f0542b4fa745f865c9c1875762746353bc35f276ca93fd3229ddba75457b9e02
Range Proof
672 bytes (Bulletproof)
Memo
27b6017431355e08a3eb82e14e20e940f55ebc3239ce88262ce46a694691a578009ab8b1da2a4c961672998c4dca8138ee886f75e3b23b03728752709b2dc79bb11726368976edafbfde7e51f5715a0b567139e53bf862073c7a9c898c4e3b5c03ef889dd35fe31800594062579ff96e7ce783cc65ded060dedf24c486b92067 (encrypted)
Stealth Address
ce78cb33771498d14e6a9f87200d90adac0a3768d12b663a6ce5a0cb2c02543f
Commitment
5c4cae230b3b0dbf463111bb0aec546265fea795cbe0fa786dc162364847e306
Range Proof
672 bytes (Bulletproof)
Memo
52d31fb0f2298806c4083f1ddb160dd2f954073a39e00d79c83f157d5ca3bb64052c8083abd002f62b9e0b1de39c61f4085f3208d07d916fd5ec3a1f3b8294fb969b97b2be3cad0e9ce2ac8a93a4da49de9d760c5295734ef9d42a371a59edc26c28980a02ba2386794f230ed2b8d09c8a932f1baa848bca268cb17503892f4b (encrypted)