# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1a2aa16f80eaafd27fe529e9b21e455de595bcf122548eb216db22ec85e14244
Pseudo Output
fa1b948f865b75524dc1ca828c041848b1a671f12225082e5ddf76a54de61348
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0aa05978880be834a15ac36a4f221a3449dae6b796009749f97fcd6cc092254f
Commitment
5a4917171b8d2eddad35ffbc8580b12ef500bad0158e85d2b678ed260a37fc52
Range Proof
672 bytes (Bulletproof)
Memo
7d33eaf4514eb1e4ba9d033f56fe0c936beb271442f4393782591dc9bf93f0ac2daf15cb57405860570fdeac6b7466f5303b3d966691c9ebad649316e76b30662882411470bf68b64bad05a0d26fe0d0c4efec42985e5fe1915113e47e75302200b25665550ce16352a95dd94e9e11beabc47f33ead7b6b41ad4625893c36731 (encrypted)
Stealth Address
5848ee7c5123e45e85af73020a9545491685d7e9bc70d010af7dba012b6c9675
Commitment
56a88ab06134abd31751bea5b753b9936edc3fda9dc8ddeddb09adfec2047c66
Range Proof
672 bytes (Bulletproof)
Memo
56b79ec834302d7facc5704cd5585c473d382c116dff3b0eebd85f763f3c37ba7936c3fd8cffc360644db05bd01f779d7860857431681b1d97a2a4a5e4ece1c8383348b689db653465b3e964b7b5b70608462f0abd018bfdcd15b2d97eb98595831de9342a18714993257b24be555600dc73c4c35db0dc6c6215722c91db5d74 (encrypted)
Stealth Address
ac410dd7d54fc05d7346ff4fed0b4d4b0d62ff89760a58195006e180b29a5f62
Commitment
8c686a7180f258c203ce360cd2abc5b6b33d79df2735912e57f14d14693ab760
Range Proof
672 bytes (Bulletproof)
Memo
753cbf3f39b7b47d2f216afe068913affd24e106e656370a458077f193c09b6b1ba822bbbe292e9ddbae34db99f7744619c1fb81b290bc1fbb35169632c1793cc40205a444f03f88423613574e4d86552fd484d2574bb1c63624264395420939e2ec83946a72043edb041e39de7a971a4b640b996c1ed6b64f1b9444ba58c31f (encrypted)