# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00b457669c5141d44aada720c4a35269217f54560ec56c3ddba8d96a4a2fad0a
Pseudo Output
24cea7d64a8ad75c1591a9ce5aa563913b77080b984a5f292bb7f783b4e88b4b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
420052e203216d357e952bcfd22837cac5f415526158d69dd1f83cc935046858
Commitment
2834c89a8d83d62a3e306663da307ac51816682850aa901c1774274fba6d0834
Range Proof
672 bytes (Bulletproof)
Memo
05608330bb49c29f9439c02e90e855a09b1ea7ac0a5d1c595b8f51c2d4947db97bb7fdd08781de122cc5fcfb1a2cf2d8bb8ec77585cc444cfa5f3be80c163c7b4fedc37f545c501c205125cbf63dc2a6ad820366bcdf703b8eec276e89fd135ea25df37347af66cd97f9b8177c2ccfa927f8f188c98ec511e3e7199ec941e7f1 (encrypted)
Stealth Address
72cd3d8fbd3e7fbbcb0992cbb63a1e4cc93994e1326efd72c78c6c74931f563c
Commitment
56c97198b9e65a384947de2ca5002d8dca071e14bd94adf9d87627a4432e9a1a
Range Proof
672 bytes (Bulletproof)
Memo
41e2a733c7bb762c0db16fcd2f48b3539ffa7532bca61b228121fdf5c4f717ae429884c0a2bf7f74fb38241f8a319bda4f61603f19a02cc5fbe7f15584a00dd3c8d90ba5b50e32715ea91b50b0a9790892f283bda708de8c8a01ea52d13be11b47eb3ff6596d53863fda3a370389c62ede140302198fa51beb1aff5908278e7e (encrypted)
Stealth Address
845bf4367d94d566ecd9efe409d8657693863382a29ce6a918e410bd6b96364c
Commitment
9ed54c5164210e1b6676f231e1d23be01cf20d69937f39f33148cc3dffb0fe2c
Range Proof
672 bytes (Bulletproof)
Memo
706d1b03ae9724b3f050786a23103351534c38998cb5da3add1ee0c94d8a5576a077255911858fb144d88cafaf04f4e7504a2e05185dfca38a9b3045730f17ed1c4a2967589f19a072711b8f9d836822cd6a4266ea152ff6915571a3e3063676b8a0938252ab1863893e921c29a4fc1c6275279cdfc7f88bac46318297280f77 (encrypted)