# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ae5a8235610790fe6b305af4814b439fb094d8cd1199a16cd3c29e6ed5705027
Pseudo Output
06a565fea4ed642ab6ed1fefe57bc2c7f46c450743f4c350d6aa1f99f0673c63
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a7ef8b589fefc96a6f714a06f482a14dc0a1bb3f12c4c96d8ec2018708da20e
Commitment
fc5aaae9f959b1a9085283b1d674bf989eafbd617847eab8be531975bcc68942
Range Proof
672 bytes (Bulletproof)
Memo
108659f49c6963e6981666212aa60413e3db2a2d9608c9fb3170c6700e80d02fd10198b190e3da2a9d9a6b5b75a0f871a8da9202256f9ec5e57a1b69773aa6b66dabacf556513209ff5722fd296a92ca05c0f341b3d8f787217d58b9e9091ffedb2717f1b0ecb5bf46b617dae6db980c463c88682903f219994abbb2fafe116f (encrypted)
Stealth Address
58da0de1842f726b4a1ca228f3dea2f8f0fad68322f958f1c43b32a0d173ee66
Commitment
c69cc11e4789ab25cfa57a7e62c79093cffa684e284a9d17df8d299ba6b66805
Range Proof
672 bytes (Bulletproof)
Memo
6a38a8d6148bb59e31bb28a09496e0d3e564f861a429a5e34aac9aed4bea70934de74179d7e2a087fac4889a3155ff104581987721091d6884f90f099b5289158c4f62f66f96ed44022ecea27e437b1a7a27dd322d8cf7aff4eab8adea3f19b19bee8b214e6a479f4fe74ffb12419baeb4c7c3d9d6e2f74d7a5e6ed5965f8384 (encrypted)