# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fab68bca558ee28444dbbfc48beef744787c2be19df63f9fbec609f106cc6171
Pseudo Output
aed156f8eb70901153fd527a8cc36d2ecfa9cb1c5cebbc1f51b590b547bb4440
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e83403e993948fdcf990dd65df9e6c5dc580e683cbe33d923f401c5860080c3a
Commitment
741d55445cbf53f5cab558fdfcfa445274c7fb06273439dfafdf5c4cec738a5a
Range Proof
672 bytes (Bulletproof)
Memo
17dfb37f0fe0fb04e7319301d780fe89f887d3f434c4b2965f1d6fe0b41053093fe96ad949cb017d7ec866fb973cedf7b4f41d5bfa81af597b1bbe0da0df15a7b2b52f07b85e817c8daf2423258c5d75ec0b2e6f1fc2e123152a87e68b537ec7561aeed45640d932acc2e172e71b510d6c8f3652206d3416a25b61d0d7b72e67 (encrypted)
Stealth Address
30291ecddac7afa0c1dd0d24c0d5f0a77a058e08f4d98c1c6faad35174d95555
Commitment
6ed1149ac017bed86ce493d967eb802c612ad98041a22f0924b3437bb4f9a50b
Range Proof
672 bytes (Bulletproof)
Memo
22f22b4a4fd25afeee9a90dfb9d071a8848fa6ee8c28d11baadcc612c9eb9eaa73c18f7f5fa35285a3dc832fc395832456319a038234616a0126bc135d14d82ee02b8850904e753234c705f7bb68458e1ac59a4fdaedcf39840feba9c373ddb373c011254c3253f5654f857659457de394e1261fa995fddfdc3c294c4f8e1364 (encrypted)
Stealth Address
d8ad9e0dc24708bcc11dcde194336eeec93632d0f3800f7fd70e8da8b0efe00a
Commitment
da8fbc4d3753d6d7d6919ac7a246a1a1b889c15b2085d7c0db59a3caac86b44e
Range Proof
672 bytes (Bulletproof)
Memo
2f5f883f8bfa942e4ce986011513a7c223f8e263e274fa5afea858996f9550cc77f9387fba8bb8e9f962e04b9349bbf508d1df4cccb913126eaa6daaf8106adf5760c28777208c5f8f456c87f93ec10af3f6d06f8451f10d86d08781528399193f29318bde48533d33260a023078282ffe954ba869c57765304359b71b0b6514 (encrypted)