# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c06170dae77eda459c2ce13a19e082431468e68b9d30ca459f4958b8cb33b533
Pseudo Output
ae4fa55a011159cbdf5ebf842bb84f4252d9d6baf0c6725bf914533a1953875b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1401fe8410aeaeed432c590021b316b5b9e8aa639724e7a2c0460541e63bb85a
Commitment
aec85f667afc358c4b364afa4df8c0cec0ec09fcbb425ec647720a9e5da9317d
Range Proof
672 bytes (Bulletproof)
Memo
46c5f96a9f98db8ce6b1be8b7d88cce78116afa80ee491382919d319cddf0eab76e37223c59bc12da20e3f67a2d7749b8285958eda59b543a7f4fab4058a58322b5439559e0ec15bc40ab474c9ae8e67174fe7767241debd3e691f6db1fba50bb60a5086fef36743a46dbfb02dbd613264e8005c3448c68e632378ac2283c1e6 (encrypted)
Stealth Address
f021bde0c776fe4454e58aec28a38585a896a06fdeffcce7154670bcc047962b
Commitment
d0931210b1a16e8944a771b4c6a37014cb05b20c9890bab57905be85db14c801
Range Proof
672 bytes (Bulletproof)
Memo
b66ad91fc1419356941c82f404ed75954da7d786d6939bd4979cbc6cddb86434d03f87c340f9fba8c8b484c57328cc2d507b39a682693962e8a1cc1187aaa3cc8176ecdda127c315c5ee0abed8c6e16239ea8758878c117c52243a40c6a04e72767c2e68a478a81c654a2a18dec465e935e35d96ba4d476aa2d830425d3b5a2e (encrypted)
Stealth Address
e0e716b20dac9d741fb1368e7f823d965a80653c79015a6d59ef97b742521b50
Commitment
d020aa2241cbe3b81a02a919a0ac2670dcc35bc324be5b37a6b8e78425c69e2e
Range Proof
672 bytes (Bulletproof)
Memo
854269f6394e6f243f3ee15a1b5a8861d784468a4cda34fbfb0c05ad8a206b9257165e9c2d58392349d35bf7b33fd781aeac013921268ca591ae95f8588e833e3d2c069e42ffbea44d1b8a129364b3aa2a5fd38ab86585f65b8fb8cb7c2fb02bab8feddcf16df682391cef2cec772303894db053eb7faab87d45a1e6e544a754 (encrypted)