# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f4e20ed5444ebf4029525aa564434488a217364ad47e43d51a17e1bfce3f3330
Pseudo Output
9a7ceb1b1456c8cb9983c0e37ca994e01d2951463d25d5e9b1feb85d97040060
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6b192659b5cc23a89ae71b54108dfb4dd5edcea0cc87eac1ff3534fa475cd5a
Commitment
aae22c7edd0e3a4a4631a3822db65b335ecf2b71684fec9cafae193a7fbce870
Range Proof
672 bytes (Bulletproof)
Memo
106130e7d114afe176f4b922029872c2b29f7c2a3fd7b3a5e8d89ebf8e10f8afc6b0d2eb42456997176bd47afb93bd40369d75bf6e51829d4a29e7a71d15af10f7fd78db2e43b37c2694558bd126889dde339fbdbbe9710c679f17401d2d799200abb56d1cfb6b48cbdde229b2f3f323f30cfe56f2d7e42df972d97baaee3666 (encrypted)
Stealth Address
62bc5f80410ae59558c44aeecaab9b10c3e9ca601dc410c8376805f980610246
Commitment
289eb3294d86b14c6677a8d90fb62df2efe242fa9047c25f6a731946b2a8cf5e
Range Proof
672 bytes (Bulletproof)
Memo
d03fdde9fdecdf8b691a4a0553bd4598760c98f951693963b4ad67938a1ed3d324ba0fffc1e82239215798d75ce0f617c1877337838824104b37755bf145b959fb37f8c42cf3a473464218a10fb6ebdd5f1eda25027a536214714cbeb41b67c6e2ad9a949d919b37472eed0e1b4fa35988920cb58f7439bd3bf9eaec46f87699 (encrypted)
Stealth Address
9676f781b945d9af99fbc1a01eac6922d7726bb9a5ed19ef485a2e53e9a56079
Commitment
50e602b5c834b6616770ddb1dc62bbcca3eceb9473daee81cfa532fcf4453229
Range Proof
672 bytes (Bulletproof)
Memo
a2553fa5b6060d33564b03aad990de287b7fca7e5a0bab2845922ae6d8cd52429a235a04bee5f279281f1b1820f78b9716c7cf872e6c853761c9bf8b0a0b428d6a653c773ec3feafe04f554ad3703f6d51378a6ba736a214642184502ed8cb20a78cb884766df1ff652c0260a3ce3a3620433e17c5449e49a5c8ce38801269fb (encrypted)