# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
06bb03afeb1a09f5a34bbee3992ac21643a611655c6e84f053038f89aad6d46b
Pseudo Output
566e91cbe1d8c0f123282f1ffa7b58ed6c1879135897942a4f2fdc274f30d507
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4230bcfaa6c5f333e9dd483233ab361e5309e6cf2c66f8efd6f18184f924b95f
Commitment
ee49a2ebfcb17ca67d3d652c246d42cfacd670f066bce0fbf874e5e61a606f18
Range Proof
672 bytes (Bulletproof)
Memo
23fee94061d7474db11a1cb8798ad1112037260acde24c40e2e9c1dd5042af1f31ac4b5e0ee39fe8f1509d6e8fb2bbd84613851a5024842e3910b32f0a965501618341f617cfded5d93b71261fc6c54f1647a158d3e5d522fd29242f0afcaa28c2bdd4baf4edeacba68aa9ffee61f56e07d71576ee9ea48bd11a4695d19293fc (encrypted)
Stealth Address
c83af5572639378996a204064bac9715a19486da04337d7bbe8b8a7ca3137658
Commitment
dc12462c06422fbb8585aa4badb3392e1348cb66c1839746e78ce23bb5137a42
Range Proof
672 bytes (Bulletproof)
Memo
b2ddf4ce3ea2e2ad7837a74ea3c9a34ff85513d376c41faba48593951d04c3ee066eef5eb99c76cb88e15cc5b3a4686cb4334853749a27433c4ce7e587e37e2398e584abc0f1b5d97cce062aeade2fad4d1ae56f23c2443fa5087e0d225164a43d71d855581fa2892ea282115e2eb0e9ae6084dd035e69a3820986dd08ad18fc (encrypted)
Stealth Address
0e557970078a519f4543b3c74bd435be9b884f09a93abc8f938212fdc141d27b
Commitment
341a801f7d2469567abca67e73ff503e803e29c93a13603a01eb404bdfebd922
Range Proof
672 bytes (Bulletproof)
Memo
51b3e1d31cffd542eb0a7d66a90fcf0f4ac9fe303c3ebd7087f1fb3609f5c53e343623b264816a63982340702f7de26c6d3d4b088c8c68a144b02c35a6f218b0fbf38ac1377a220a8cf3bb6ad50b876e616acd0e600d6cd5142b7f3324fa285966ac5c846e041363a05f402446ff1b6955e6ce74cb75dd8e151d9d0936874ff9 (encrypted)