# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e21ca95a11d5ced8dbf34ddf3e858564410ccea575cdd68e18e38c35b62f8573
Pseudo Output
a8621b9d1e527e75e3a8b4ae9a22f49f0efe73ab4b5be29d8835d9553fd69f3a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aadb136670b7dd94d34f6cc36a1a2448b793b888c23c9a1aec883ce3906cde24
Commitment
820fb34cdf83eb7c3f3c36aa3cb326020a7750894e90e5d9149a6aced0b7c53e
Range Proof
672 bytes (Bulletproof)
Memo
8752b42c0a804fb4b3da93629a72753ea57fd27563173c8f85f7e6ff2679cb125c6d3b2c465f2675ea461cfa41e6c13a428eda4fee5cf53a02db7d97c814cdabd8b34eb8fa61243ddc72f74e932d72cc8ba8f385d638d80031fcc6fc91187cedc4dec50cdfec45e8d111d2a5641a5e5e1644d997a1df681e2ec148653279341f (encrypted)
Stealth Address
fead6064d15f3ece60553cb2887ee68ba8035b09ccef900f0b5ebd95ba66d16b
Commitment
38fc5afae65190d492744376fa9c68c465304f032400a07b71a4c26280d18a7d
Range Proof
672 bytes (Bulletproof)
Memo
2bcfe7f1caaa78ac57f193c707a695a30fc62c0fb2fa50e94b573d896e3854f345aada5d4c91a72ba21cba04bbf445f0307debe161f26afbe8269278f288932c4aa7a12bba419643091c50289172a40bd97814b5f838ce899bac613530a8ec0ff6884df9878f6dd9e10b1ebb281338f5fbd57d6d0e44fbf2b581e11878da61d9 (encrypted)
Stealth Address
bc9690b23554881bf38ce64fbb4e0ac60f40052c80f345a57e58774b6559af08
Commitment
b40cc13f953cf31b69111fbcdb3a778537a7f17c39328a20a0fb7316d7b4cb31
Range Proof
672 bytes (Bulletproof)
Memo
55ebe7ce78649174f35b37816ccff1180f964b27715c9af7bd22c908451807e63dca68088c03040d04f78b2ef31587dd49cdc881afe13ac59bfd576de97265308169d2a7581b6265ea192084bd52cbfaef318afb13ad8695a2a699c08a9a865d59413e79b36a4f7443ec94b6e901cbdaaf286d7fb4b31624d28514df7eb5ddb6 (encrypted)