# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b8c4233a2b8e40fb794defdfe88ecb0efe361ccd737e326206c5d8091b683662
Pseudo Output
4c52b03185fd195f412da54a91951fafa837b904d48d9fc31744c821711e4d56
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
16a178ba0bbb6b010b147f33b76912f84227b9f2ccba692e77b9782b2940d911
Commitment
463a037e61a785f916e962978d77f6f83af2284f88e261a12fe46ae4ccf2e103
Range Proof
672 bytes (Bulletproof)
Memo
ab286a0bbbb1c84212613917326c7802a7de305f880af665fef681b362a557e902d8b1d4f2bce8df7b0acce2b97eb7cec71a339483edda8b4c9dff6cb1366ab2107d6351a54f5b6760e1c1d5c50c0fb337e156babb261ab64e527cbbfe10770e077e64ceaf4ebd87ec240a1bb77c65da8d3e6a28e477f2219ac2b35e00866349 (encrypted)
Stealth Address
70c98f2b3d12fd9283b19e241af46afb710bd8e1c47c96b30211f7c63f298575
Commitment
2e63f2e2a7ba53a5c6980938fe788c50cdf9f4377f3c1bb083cf76f2ed591932
Range Proof
672 bytes (Bulletproof)
Memo
47a50be407dc3e22bf11252a259ffd1cc4cf132837c6c7e97d01545ccc429e660d1bef36f80dfe55b450704e05efb2026b4c5f34754583478f689de460e8e60d26bec797a37e98edfe49452d308daf3fa5cb91d91a3459c198f8cb011d139f8cc1509a7d480616471ceabf556b7b994189bbd40745640f1bd25b65f6b7dfe277 (encrypted)
Stealth Address
aaf1c4da7400aa0d412364b77225cf58758014a39820177e42ab0d2853aaf524
Commitment
601bd7044a9342c79aeb1e1bb2d69fdec5a354ed94b3b4e85b1c084a11afe362
Range Proof
672 bytes (Bulletproof)
Memo
e8f6ef16a7fcaf1ae72e4c7027f7407c4d1e5c41885850e8aebaf52919e65fbc5485ba21e3e180c7fb5026807140862f78964a4ef2f452244a2099fdadd150bfc63961ecdf3dd129e9d1cca48f9082bfb0507827261f6cd70e56a5f30e59ade734fc2efb6e2e6e046cbc83f947ed61168be4f64f03501b193c57dfa798f93d3b (encrypted)