# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d86a0deba73f965df87a2566ebe8bcaed2cf18bba16bdb0c8f249b077b2f7040
Pseudo Output
2a302d35ffcd0d8e861be6d8fc0e9e6619d984cbb59cf1da0eba27bcfd991e15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54be464fd322afc774ab7d30ca091fccd2fed0d9d3586ac1f940a7000e921e05
Commitment
c0eb1d8c476331a0e5438b7973b229f2d49705faa992d0e9a2a5f75c6aed2b57
Range Proof
672 bytes (Bulletproof)
Memo
baf8e60abb7d5f527feb6c6fbcc4da03040f7c4f5b0b21264469c1f03ca815ee044d54bd48d4bb97501864471bb2e1a8b9609725bd3275404f2442839f453e4461a10f1ae86fb9029b504f49dea030f1de2968463a54b4df3f3da79a91b08e0c0697f3cff3603e1072adb69bdce04a95fd3694650b6d5cefc74d27e23a6b8bbc (encrypted)
Stealth Address
aaa98efbdf6125e7869ab4b4542fcfc0434648f066008f278539ead16abf4217
Commitment
7e530fd72ec61fb0388e8e0cd8c24405f823640500cb417083a8302a3d50f265
Range Proof
672 bytes (Bulletproof)
Memo
58f8254786c73c5d0519b5790b6cf9f7e7a13fac7f741c715cb875d037ec60e46cb181c226adcbe6d0713d383f94047d63fafbed735a3d37f40ad6edeb97c1e6057b3f9a8bbb90507b6bba4e7b4dced8610ec20afeb03710b0d9e6058916cbc25a7d27341063feffb18c4dff0b17c99a179bd528ea6ef791495c247c2a79d1b2 (encrypted)
Stealth Address
1ee726164c75403a73e7fdb855ae7e4d35c67989041fce01b7f8a6a0f0142d1a
Commitment
c075834396a7f348e2e8ed76f78b2fd27aabd11ed77bf9608e3f1ac11bbaf766
Range Proof
672 bytes (Bulletproof)
Memo
809ce7e6ee2bbaf421d29d1e81e80d003e95f300b43dfa8172de036863458758948fcad28c62749f5864363368bbda651226980df805de6533d92615eb241172c9e020a7edae453db177497bcbc64bfca8f4c8897eaaf6bd25ecf9ddf11603bff776934a2f11dab8924db6193b4dbccbc6ab27ece6ca261d0656782dd310669d (encrypted)