# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ae750ffbb752eb4602d161baccffaf28716024cecb6b3beb9c5ef0e2085cb57f
Pseudo Output
78bd46b4d23b2152f01cad0618910da55a3a42ab9dd0bf336978e79998cfe73d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce7241b0f66432e14899cfdda6bdb4550ecf8f18cedfe5bd128333609d089438
Commitment
c271b58876fe47fda6a365edbb70bb171a3eda29262934697c5fcc9b33ff727d
Range Proof
672 bytes (Bulletproof)
Memo
4e0d0aeac47556abf162a91e3d37e0e0f9ff55c44698b335b477a97cf80369886d0c456ff8e0a4dfdb3edf8b11b7304413cc34c9f762cc2c2cca6051e740f423d24a14984698b76b6612ad4b98a23c6580e9b085a467be4ae607dd92a2e13baa14fc022ef9750f449908843a1802b199f15bafd3c8f35ae9bd53d40a65f6129c (encrypted)
Stealth Address
d4f5b1107bfe8046bf53fb8cdf04efa2a13d58222a3ebd5a47e05fb24bcd461b
Commitment
f4f2673fac3799b5e7ce63dd69fe9232029adfd2b16afafddfb37022b66b921e
Range Proof
672 bytes (Bulletproof)
Memo
2e54459a4fe5bbc12a80f0b21c08f7abf3c6653d41028c1d5cd439361f8d46cd5af95c34d66058ac3439ca9b3f41be66f7308f7b9ef44e0c4e7ce5d91f388649f03d4ddab91f9c43e6b0b269ac2cc0360454071ad33be18f216a0fa19ab872ebb30172411122027ba232c91b5fdeee16f70568811405e96d50a37be3a78ab8ad (encrypted)
Stealth Address
ce44a0dd348a005f4ce51498e16ab9cb3a893e030fbd5463d09676987291d579
Commitment
14c085a9d1f28ab740f480388f82a65031a16085538db26f7e55226f87559262
Range Proof
672 bytes (Bulletproof)
Memo
ab970cc0fc7ccb96e34b413247afa84c00b96109cd9d950f0d52fb8601035af41865c32a0aec2cbcbfef3d63fb98e3d50fd0edbbb8fc0b9b4f3ba6a4e47c79deb82b5f1252ced600261f5841df444d74f6a53d414c36003a0377bb3c1052034be05a917cb746596fa0fbc02c654ed90d24092c0f487a03c299a2e40619077d08 (encrypted)