# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8adc178f5b23eecc8476bfa9e6376c18854ff60edb9d8c4d4a87c3a17359cb5b
Pseudo Output
aa43398995504e699f1570a75e900b860b5116fa6873060a60ba715c2ae3397d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
06140b8fa531f30e6f415bf3683fa2dad58cdc5c51d5cde9955b4984ba8d375c
Commitment
ee72804bae113ef2c8c3e1494c9e7656d7200ffa52e46607c46e554479a6df2e
Range Proof
672 bytes (Bulletproof)
Memo
a4616e1442463069c2aa5475a9800729ee9595f7ff10f87d074e0f9ea8abf18040627648349b9851a7e2143e63442ce46f953ec8caf3418f56d6256b00e7701f08550fa01af8f50f915d2edc3dc475008a47180c9c995a65a299a6b7dcfe13bdeb1dc1d859a7eec048f7ac52983a24b0e53beb6717b9b7a626207273366b1f1d (encrypted)
Stealth Address
32f2da7c3200ae0a93d8843573c9e6696968fc2d82b368bcb85f778c2bc95f3d
Commitment
58c50ae07adf8f82b05194a5699195204de3d564583887911e8768fa87630f46
Range Proof
672 bytes (Bulletproof)
Memo
eebae6eed7666dc3f60c511234d46973df5d85c9041d3dc7d8a04bfc164ec67f5c6b311c5d46aede0ae7ea6dcc4d49577560d6b942955da1f4bf48afbfae1c8443e9b134713ed2484a90e440459642f6669679ac5f326c7315867b61f4ee9ff14224ec86255f75e382ea279d411830cd6d10712a6b76b8f03a94e238ec80bf27 (encrypted)
Stealth Address
88d555bb9dd263784abccbfc8848b9b4f09296a4c903e6542447c706077a6545
Commitment
46451d1d10a2decba99fc33bc12533adce89eae9613825ae89ff41fe7dfc954d
Range Proof
672 bytes (Bulletproof)
Memo
9927cc6434c6e666d5c936e671ae3883ae798d7d4d85cecd93e31886df1bf811eee3aa7ddb9688d3f3c292c5ac567b305f2ce15723a994b2c453276481077988e2f9539b0d3b715f84e63ed830b4426f6249ced1fdf33b5cf2f3fa7d12ba75a5096a257320e247b6a20055d8e3cb4effdfde27e4422da62e5c6babc08de61b31 (encrypted)