# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
665522f4dd941f676cda5ab4ce18002104b4604b0011ec1109566f44f5d8d54e
Pseudo Output
00403d60ff0fd726eafa42cb65a83bca57c91e4c3bc90cadfe8dc4b766833151
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a11bd86ad6f7932bb3bf778da95fb072de5ffb8f2c51c48d09d97344a10b028
Commitment
84a8a64029dcac7b52648a1c6cc25a4b524aac9ed980e74829a3786e14c11e1e
Range Proof
672 bytes (Bulletproof)
Memo
e4ca8f79e01fcfba6434f5640c57d1ecc9624a3ac62503e3143c8bf2738ce5c971e9c60d851d37dd2f68bf0c02b711d12553c7832e2764d8d175f2c51bbc9ec07f48c9834f4eacb4d41f35dd8c0613d45376b1f07bcb6e5a88ea6d90fa6e3e226eea6872295dac4601bc3a5797e4613c2c97ee12f8a472e67025244d015e8772 (encrypted)
Stealth Address
ae7637eae65e395bf45a74a42c0036053120798a4ba9af6abe4fd43846c7fd3d
Commitment
a4e9f1afc6d646e9d61528ae1b494ceeb9fec7d08b06b723171bc87f21ec2246
Range Proof
672 bytes (Bulletproof)
Memo
f4bf491cff7d56002b37c60ae8bc386f98b4540520ae070dd68a578b42a66e1893ba7a2b7acae2cc374c92c07f3962d7b92779564c063336c46449d15a9b9340c32ef788e4bf908b40faaa1d7c4cf51365894fddaa0df3fb6db85c3504b6bd6dfda20da59ffc0d1dbf5daeba5d0c78cd41c24a92bfa6fbc36e907ba69a20d4dd (encrypted)
Stealth Address
ba0aa01da9eb7d138eef3e7d352c26491f7d9029d1d1865ad775286b9fba3f66
Commitment
902089d92728c21533ead6621a015fddbe5b5f98755ee0ae99f08ad7af891a6d
Range Proof
672 bytes (Bulletproof)
Memo
65ae4568c9eb5549d95444b054b080e95b7a82a056c8221b3473c9061b7e2cf05e309a345ee6eea2e62ca1c7f151c25ab4b802de8abf18d11873e02bf6aa23aa6e0b82301e48520bd573dfb492e40ce37c2501f604014d1d760f3488aa859211e604da3504873a2350fe7002562704675e905ec55f31776c2e37a741d72a2713 (encrypted)