# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa0f9e154a0d1ab04141bf43d6b467667e08f3ae6d3c2a3a93071aed6b853753
Pseudo Output
8a0c12c916a16c12410eacc9403021fd60bb9ed2728b94200cec33eb1a93a82f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eab24046c7566aa400a7745a2453d80beaa6ce9cfab761dcdf91303fb341454c
Commitment
9ac2dfaf0d53ebbc56c8fc7213659a12f6972022cb929c5275fbdaf768f79f18
Range Proof
672 bytes (Bulletproof)
Memo
43d5e7356b01c7dc0b2f165768ca5f6ed4bd6b7e55ec8099fba227546d35b2af3414c92d2081d4784269be6aad1ad0cd569c0a9ad96fde5ae297b6bef24bd2cd77b26274c05768fd49e4176595504be6c7964d0f763f56b9bac8242900e8e5337ca0c3b0823b1bb77bd4edf87a8102350c691ff948b2ff48e2a6d71f8635f4ef (encrypted)
Stealth Address
fed5f7e80afd58cf2fda8d79de42ebf30672594bdf1d6a773146297b65b55d1e
Commitment
e6d552c02aa03fa6ce19363e4804f3f30c4040bb89b67a465e703db54d74e72a
Range Proof
672 bytes (Bulletproof)
Memo
808af99c9fd72a73ccdaf64ede2e55daa39b5dc7b70fc58d1f255c62d24cc381129b84ae13c3974c922d3a4937cb4198ecc6d953b8a0747fc9dbc17d7175488a2000fa4e715e8caf09a8b6613da48370e6ebed862a55a42bef263b92ed9adbddbc49800d52b99c7f1c0c5759b259b826cfb64b21f2d2df2e281b88f9b00d963e (encrypted)
Stealth Address
583749a0eeded8e419eeaf110d84cbcf268ace3ce6113ceb0624f7e70bc3697e
Commitment
1ce3dc8c222df3cdac5cdb178bc42dbcfc47bf0827fd21b58974e88c12c3f47f
Range Proof
672 bytes (Bulletproof)
Memo
a7c2799df929fa4e27899c149f9f5926b7f0a354cef8b18b541db7d1bbf574a90ff432e764e00ce6cf0c4f9da2ff4371394e265a41fb055572da93934a7983eb504b2abfaa0997c0fc0b0d701ad8d8953dc4c5fda7b2f6bb7a921ea1457fd0566d76891c7fbe318982fbf88595c29875ef148358368772cade1c3a312f451cf6 (encrypted)