# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
501a8d4777dbeddb2988d87028f911bd1ad30b6944714bd89fbf5986762ed845
Pseudo Output
204b235596566f7c77ce61386e6178db3b49f54a9707941e8a7ce69fe7273a3d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4448af4764bec9f79d260102a28c2e6f5a47e3d39d10125ecc177cc546340b5d
Commitment
aa07d04503e6c48c11cebb30f33e354a973e06d012046f115a6f902dc9f6bf0c
Range Proof
672 bytes (Bulletproof)
Memo
977c6f4551b03fd409fde5599e14ca92159680e48d7ad278fe17d53aab8b696847b3cc3d2800124d0f029348156d566e751c7cd762c11136bc6d0647b886809bc194f1aa31049c65e5c7fb87e80b575942a47500e49dd737e6d2c7acfcf8fba5f21cb3fa0a3df6b082bd75747c63177b5960789e4fc49f545a0d538d4f5b58e3 (encrypted)
Stealth Address
344e7b512fd1d1f5c02387e01a937c06054b524f4c8c41eeaef01c96fac3cb7e
Commitment
ceee243996f44c8ba89b8df626e784f72a1066d597b4687a76023fa85afc6726
Range Proof
672 bytes (Bulletproof)
Memo
013a559344d319e1d0a8fb9939da1ab823d4374894f50f3c78ed757d73596fafe2de9423beca5f22cd34d5a4aac24c2fe1a19a63d6babe0cad370307af4f683b823ee1f7ac8d50424243fefd1f83f78c7dbf6b9c35dfc7bcc000b4c871b100b2c3b06cb7d9add5098bf18ae2d8004943445024d409bfdc2ddf0917840e11a657 (encrypted)
Stealth Address
0060303b37377aa773884b20e04543ebbb595b75f42a33c683817391b3f25f44
Commitment
9002034c461aaccc0dbf74613d1a4da591b6617d314713916c2c82d76f55541a
Range Proof
672 bytes (Bulletproof)
Memo
84555e23fe4da3216034fdedb0a9362a20895acbc1a33d8b65bf292d61d09041c1bec00d71358a5abf9c2f872d9df534321acfe4b69d8fed7678bfba9675bdb50302637d508ff272dee7db0f48c94cedb2f4079d254311d4c3175bb0f519a252889538208321b549f75679e59fc9567d4044b6b8a80448b0a85a86c18ce5e828 (encrypted)