# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
162280dfc55cb9cdae37f336da3f132b61c6fee16cd8c3bde40be51c1e652739
Pseudo Output
a24b854dcf482617c6e9cb7ebd2b43095d2ab4f5ceed0809633bca13183aae7c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aeb652191422396220802ba2f6b8d42fb2e78e54a2212daabd66744916777a5b
Commitment
d054e8a0676dc7b370549d16d19800974b3ed57e42a355aa25382e9bb1318b1e
Range Proof
672 bytes (Bulletproof)
Memo
24e48d1754dc7d0ed3774730619c0b29bc1ed2e8808bcad61dba9e2523161663515aa3f36427dc69b05fd641fcd01b8e4bada5a9e396e36da85da352be085020b4a4d173bf44d73daa3783a08ea29ff7c545591e3d9d4cf62dd5b1d502865a01ed31df06f7448c77378d57fc5a5de9f4ef6ad33dd65b4065e6212f791e97d2eb (encrypted)
Stealth Address
942fcb452b15e9958687db168e63441d0d32571635727a3fda35ff43d488752b
Commitment
9630880b29f2fe50a828c090dc0842a80110a94c3582688319127b598e5b5904
Range Proof
672 bytes (Bulletproof)
Memo
8a5e5b1a0699f5aaec129e117d11167eff5cc2abb899e523e9bc6554923b135b64617ce23e1e7898287534cd54be885819815a1bcd60a6d213781a82fcd0fdbf727a148dc123df666cf789221668d3e1b1a1c86a310ffa772506dc6e41d5ce498c4d0b3c01e37af8a1dd32ba892775de8c70ad8558a2379777e0693834edbdbc (encrypted)
Stealth Address
86d816f7c83670906a24a351abe99c470c6000b99ca5a412b496d3506a996932
Commitment
0eb0fa4a1d96594bb1b5c9c64620fd6db610722c60f1c81945a872303418c035
Range Proof
672 bytes (Bulletproof)
Memo
b891610d4b597f4c396e73be10f9b88bbb61da18aac3128dd027fa6285f440f9a777fba6c3af2a756ceeb8748f5c16423bc82245d1ea2a59e48496f8be87a2bf1bd38e61826bb58e8b8fc8641e38d0435f0963178a5885e6994323d53f1f7e28256cf07a288c6cb373d6e81009346906dae84e0fac675bd49492470eec3578ea (encrypted)