# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b2a680a7e55063dcd164a19f6e70b97754a22bea493d99a561251f8a0ae22a74
Pseudo Output
48e4b7e09126faf4568eaab5ec752c3d61b162ea5a13dcc729c86318a6871f6c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
08c5497f88e9d76690aec90fc1944fd87b977d90383f707e4c37026710ce565f
Commitment
023b986322261f6a6248f8bd594e10d18f3bfe04d4c70e4508486f77953ec440
Range Proof
672 bytes (Bulletproof)
Memo
ae70309bc6ad523ff03213f5be907c02f9f8d950207c6ccfa455af7cf3d8f30bcf6179b43e32695231e54b17ca3987c2597856edfc94281a554c71aef77411f1874dfff735398c0ea570e1868d8dc2e01e4841c1a4a9010a69dda58869d12a01a2a414b1449be6978c9cde7457f589c84ea4314c1f50077dd5ada7fcd985efd0 (encrypted)
Stealth Address
e2829b509d70f8a5e2f914865dc746dcd345070a222cc3a9996f75169e69dd60
Commitment
ee97201c45cb8903323629aebbfcc6adcf29699e1abcf309bd4b99c0d66a0255
Range Proof
672 bytes (Bulletproof)
Memo
f75c5dd42aa89f2d1a5abe66794c50b2ac25ea65b35ea08aeedbd4bed3eacb335f7a8d9dd1105859a3a6f2339a4682d70002b77b72526ed9b1cc94be36cdc41cdc41417a8a9704066b76058eb459fcf5274fc41fd9817f1fa3a0187e2d664711eb4afc6c5f40c010508443b3b96a1de2f73514eadba943cd6f6a458919f66746 (encrypted)
Stealth Address
80c5c931f0944e7c0c502951e3626303fb6c93fae8cd0a2b7c142971b2255e29
Commitment
4421dc3b943f56bf2cfbe2db6dcb41193e2c4a6650649716c27f855e4d282814
Range Proof
672 bytes (Bulletproof)
Memo
f047512c9154e2b329b61edbcd84c3582ff8783f2f89f90ca6ea55859faef519c1950ade94aa878868e959d8b63f585a9fe5344a70c3ed4a9372c6fd230a6a4374119dfa4e1bc53d564faeefe0c2812a056f8262221af28a8ed384a9696f5b2acb1ec6c7410fa70e5ee3a03fe58d313c3d3bfe744a650b70dfa8ccba23e462d6 (encrypted)