# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38917e480bf68410a97a6e0d7e579f093d7d25e630b27b5245e4c764a08bd445
Pseudo Output
424f2587a943917bc3e864eb44807a968906cb8144ef14a21dabd8b429372b45
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aa8f07afa4e3702c8fce094119dd5030ab329fd19d7b983540558f48b11b6f2a
Commitment
28afbcb605ba3b33a2e1063cad71b080273778ba7892a71e632a17695475df68
Range Proof
672 bytes (Bulletproof)
Memo
0d5578c86fde62b28bd620102731ff5ffd6cf08ec64aa9ca672db9b3a55dbf88123f4469a734bd715534b70511e62d44af39329b11740b04117031dfa28538acd2e3981d2ad31dca8afe742cab6c50161d963512b00434682820c0ea53ae5cc16016bb8632eea8af49d84d840fb152a8712910f9f12ab26c1128c7297502426f (encrypted)
Stealth Address
f61d12e4461d1ea96a2ebc5a87de6aacf2c0eaba7477263bda3d6056cae9050a
Commitment
147585424c671af1f22c4893f6366bb3c013465c4fce3861a176ba722667020b
Range Proof
672 bytes (Bulletproof)
Memo
df23c523143504479941ca71f9c76c7b93486e5004980d367e6d383fafc0ac34253e1369fdbfef98beba5db3aab2ac1abfbbb298d89f002fdb2a5174a9649b9756ad2a6536dd5a916f742695499ac86b2018acb2e8e0673e46e3ae6bd9daf68a92ef9b3bd7998ced4d969922c3cb09ed0d783dc2cdf09bc5d722404d24153f5d (encrypted)
Stealth Address
d246b883f49dc8a08e1e964198832e795e8d2618f204ee8bb1bc3408e8b9be09
Commitment
0ec77884e4dc38551f5b597faa195b46e51d5c0bf85219c5c0b72d200b90fc5c
Range Proof
672 bytes (Bulletproof)
Memo
fc1b8ce217585cb0d30b99ccb66c8ce62989ca8d2e1563c9b2ab1849df008e3534c48038a56f868790cbbcf8d4bd319466b5f8dde15ace55f79a8b2d248caa83070fdc4e28d288958d2e53312ab76d8f7613e343514e11f4512abbfe75975b3ad2fe30a830af05db0ff6a58ef23661bad9f6c6064f46d72f560efa3f84013fa7 (encrypted)