# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b841930e4a606facd6c42fc92d5e5c95610fe9c20c44aca26407ace54ff5c406
Pseudo Output
9890fad08f2657c49f728bd3c6973906b302ef7f36136794639a3ddbcac4a51d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aef68ad769e2f2d42ef89c6578bf904df270cc4bfb850db46a061255bfaff128
Commitment
64a261ffa40ad7e9d8daf88e55b795da3fb7b04f3b5c0cc8d8c491bce971b139
Range Proof
672 bytes (Bulletproof)
Memo
43907a99329365fbf6aa1bc864dc6ecc4646cf74b5e6cccfa05b1978525d16249368d398df1ec11a69955aab920a298390f8d8b8e5368e8c64c9afa74fee62eb13eac578117413f5e2644bb12cae817a9e5ddbabe06c32535f32361415cbcb55efbf44588e89db9b86bdccced1063ed5c4d80a07ba6c9c8409a8a5b77a96882b (encrypted)
Stealth Address
c815b6d01bd984e0a5a67f74014894d56bacd110916cbb425dab9664458c2277
Commitment
e4be2abc11239cdd2f3036076fd8b6f12a4bdd00862ab9c580ec753c22a0b04f
Range Proof
672 bytes (Bulletproof)
Memo
0b947825d4e30345083a822b6c2425657dcc09213a07dd6f032c7f855ca8ab9f60dfc5350711b8cf363a92ee132e035f208f86ff8bb8f27717dc3937d3fb06e0afa763e570c03177b54710bc229f954b39698f170ee13e078934c3c676de0ce90f7e58d04a1e63a2d613cab3b3d2e0163385aa2d83bc0aee3bcc0ad5fbf610c0 (encrypted)
Stealth Address
2e8e0d9c75de8c20f4984f70595893e46b03797c3ead84fc2ce76be493253d21
Commitment
b64aac7a42131f9ec62a0f39173710bf477f9cfbd324565f6d3f63f5189d2013
Range Proof
672 bytes (Bulletproof)
Memo
c60693924c398d61645f24555c81df182cf17d7ff2d8861ee2982ca0ae7e47765566f126ce99bfd2195ef496df3d5a5ad51f1b0f14682db51079130e9ae1d0a479f776dc418d01a28f4c3178dc5b8928e8175480d3d4620d0b6e4c20309a61b95a04ba2550bdf08195d40bbc19973d2d95593873e21ef6dc3adb8eef7ec20394 (encrypted)