# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b8551df734435946e05434bb46e540ee061333d53fa9ed9c755b3425567a9a3d
Pseudo Output
e63dffbb1b10f15d4433e3adf80b41a32e4e0f53e14c7eb0dcd10a347ae95e4b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
908c5af88600d427dadfc20627188d3b88c67125614b1eeb108c317749343a2d
Commitment
b6bfb391d6de939b3f62bbb7195749c1f63adffd2138a9cc9c58a4d16bebfa46
Range Proof
672 bytes (Bulletproof)
Memo
54deb41a880a8210bcefa3625f6560a75688e82095e4ead81d7062c57e587cef7b1d1eac23884617b2ce595e9b099d8a2779a5ce6bb2a9b4da69b0984d6db9e281acba5f99b51df31864e9e678d13e3886f8881b1c6817c78de6b86750d1cf69bd72c4008459ff7be2f166178b97bc43a39168fc49f216dcc74875e7eb606a63 (encrypted)
Stealth Address
8c2be58c101dab55c2040b40060eaa18d4f3872ba1dc37791faab9428ba4c67a
Commitment
c6aada342ccc564d61653a3f5e53e15e63e8a9c44d237c75bd8447766830c707
Range Proof
672 bytes (Bulletproof)
Memo
cf1d3c301f2668c3cfe3c4e6869a2f245efbc34d36c7ad6170456af3b263107864eeae3cb00d72b5be29c825b35e42ebc4c0776412ea7a84457009d9d00abbcf5aa24dbe240e1c3c12e7422de1918fd2186dedca7197d11790d3c50a5b8d6b80380d97e3a8991406bf464836c067b59842f7ca5d7c11ba2a08cf064c5a927a0b (encrypted)
Stealth Address
a455fd56c47cb0e28cec9d4a21208714d48fd3f6f5a0e7aa2e7b2efd8811c342
Commitment
e43a30b526ed57027937e76184f73340414377f460fc0a23063243d20bc02007
Range Proof
672 bytes (Bulletproof)
Memo
3120bbeb8d2cab43e0ade35b9e362ef378113444e69dbdab471b139524e4f8b2e008c6e43fff98be1a8da9c6954de1c1cf1f3f4122d26feea1aa28e487f75fee04ea368035f0e28f1118d7ea241f2fbbd6eebae99bfe4518909382b2697946608a97c5546c20288d3b9554577f31b67923f29f81103092d1ddcc663cea5d5b80 (encrypted)