# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
006a0e53a26e0a1eb5a26f8ffdd0f7ae77ada5e2d0e26470152a6f7aa520000e
Pseudo Output
9c6e6f5141edf68d872bc6816cea0a4848d867a59a62788566f84e8bc61fe85b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b40bbfb165c43241906234bed2e25b922ca292bb9c900c53fe0283be3949ae2f
Commitment
1aaec1834fe1ccf955e4b4a2688552d4be6d427abb57b9cc9c769df963d54533
Range Proof
672 bytes (Bulletproof)
Memo
80d62c834bfc400cacbdcc55ea268d2adae292b3fc087288ede5b33f88675c86cc443d1b871c9037d21cd0bedfef402994d12858466caa703d4c05dcf83651032c7814376bdc31fe2b142aafa9ac3177b8ded18089c2be58437c6efa5e5481ac2a2617b7983bdbe8dd8825bf04b78c2119ab6556de2076698a9c40a9ddaf94f4 (encrypted)
Stealth Address
3ce97322fd92943e014af301672a8961b0cd3926efc05babceada4c4c78ece4a
Commitment
e48a2cff52e8322838ed1c502790186d569cbdc1e093fea40f068b5f91d3a314
Range Proof
672 bytes (Bulletproof)
Memo
b8496695ab21a4883d0d7c93b82bc868c6b3b9cf8df8839852d7ad1ac8f15309051804690c6144f6f3fef792484444def18b424a0f96a97f3c965362021076337764726e1ad6edf8fadc661f3c738e3133a8c7c965c5025364a1a2c97a679e1e44deb4a1f647bcee98b8a7c0fca7f35d069655c8d4c978b0e297b9f8835606f1 (encrypted)
Stealth Address
52a5cfcaaa0da82db80b83cc599c2384fc28acea003246bd2fce4c298a11b70b
Commitment
ea89dc62a8c8270dcd4cddc16c94113576e8811c7df287da9a4a4b6d6254697a
Range Proof
672 bytes (Bulletproof)
Memo
9a90c95cc17f4244883983e55581d52e816788cbb3dbabac2889052fb3bd9143a6d933bf28679dd4a58cd93795e5e3caf8602a77b0f66e94059ec7fea9920f10b5ca180f4c9013363580027e4a3b6bf66e0de5d16dfa2f8300622bb5afe2edbf9bd4982b51de361b89d7d68f7c82b7c5aa8f247b8a3121824e3ed86a6f88f8d1 (encrypted)