# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
025aaafbe2f2bed51a509da1405bdb67155b75604b6bcbea9c73cbbbd5f57456
Pseudo Output
54993f76c6700cb9723303b99f583dc93004f649634b27d6ccf43f1cc017e719
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e2ef9f20d225dfab84e4b375aa094c3ca17c55889a42954092be4368d493742b
Commitment
74b32ff0c366680936ab277a8b9d0bb1d11705d586f76f466874ca3223ac1563
Range Proof
672 bytes (Bulletproof)
Memo
00cb21bb40c498c6dbfdc85f777cba68c6de27e005600448eb01d05ba53a078a50fb216a358b19b3b921e585785430afed9ea465c72b17aed6801087fc661be97c3191a30880575e1a640e0d80a73b5d8b70f0203b25c62f4d166bed35d73f6e3c74ec2e055260c7e0a64d6d6bb0ed8dfd1ae50e2b582dab87db3ff35767c64b (encrypted)
Stealth Address
0a4ca1cb527f2798d18c2be2a93bba859c1e69b8e3128a3ba4d71b86f016a617
Commitment
763a3c994bed5f0dd5f6b1855b98d7d4e808b4c9e956eb3221adbf637a63565b
Range Proof
672 bytes (Bulletproof)
Memo
0495e6f0b7e25c6dbe58b83e3f76f3f60cd46e187a1e1d2831299d5e5125bc68fbb4f9579e3ec9cc6ed15953a288fba01f0ff66bbdb277e0c51c840b89f86c4c45da72d4e7523a700e11f2687bf6d418feed303ccdc0f1ee66e56554357a25b78a6e6caecc97d1d3c4c6e55253059d278124c918a7970a1b8931f8b11af65ec7 (encrypted)
Stealth Address
ccf173882271f98c9e615c03c860281cef34fdf932b085882b9d8ee080e8596a
Commitment
dc3fe6fe9a2df9ad9acf51c4238278d84910cdf42c725e0dd3a8157b6556313a
Range Proof
672 bytes (Bulletproof)
Memo
1f40fb39a47ee2922836706d73d01c338711c9dfb36a6a6906f163c7195806709fbaf6c5226fcde13f298a7f74daeaf1b037b0d8d493c9c83b2c4dcc716ada8d86bdf7831515622a23ac5b6c1c657561adb1dcd489d598efb9f6b7aa11251cb60eceef4df9343d5ba78b7fe59ee11e4cd593f2ecca9473dd88422d249cf7536e (encrypted)