# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0608cda3228d69ac62eece7114f9f2577cf3a1d749ab53d2d4e046a5d9ed914
Pseudo Output
0aefedce951a036ddfd2b5ed001eb29e2d0329aafebafb4aabebdd059ffb6d39
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8ee86aa5133f09e197445186dac62d8029a8fe153cb2621d9255f091ad6a3232
Commitment
0a32859c5b757e348eb86498965b46b43091a10d6cdf3f2812a12970c3a95a49
Range Proof
672 bytes (Bulletproof)
Memo
17550fe17398ea3a597fad94b533d798bda9c3d79d85fa7ac753b5bf2eb4ff58536e90f94e9b37ebd98a6dc3b6b98006cbe0cfdb8f4daf7ff9baa7a65a9ac7b4d62fcd3258dea31de9ac4ca564db87642654e74f735ddaf59c0c38fb841b9c8e3725643325b9870125709694681307a7f408e896f8bc153050180298ab69870a (encrypted)
Stealth Address
b4fda08bff3774bc447d3c86f643090a75b769fa4b64ff1c996a7e39e537863d
Commitment
5ad913f252c14993f37b5b9b5679e3dcf90ee4b1f29dfc2cc23984483a264369
Range Proof
672 bytes (Bulletproof)
Memo
168d5951a16f7299280cf7224c87191e7acc7fecdc84188f88988cbcb7ff496d9547b3db1c375c412f21b99cc0a1076ca9f711b7a26735ff5d78c218773a8a7b6ce1e787f98e372182f97bf9cba0b141b9ac59088ea1eb9c7cfd06ac53a3ac1e75444331e191d5a808691025d61e84fa53a40041b869d2f96f83d2eeaa61b71a (encrypted)
Stealth Address
00041b454bc2bd98590da56ee2e2ba33cd2a0612f98027ea55d3db67e8292514
Commitment
b0007aa689478de8ddea8b73d8a4387c101d15ed7a8b5d11c5550517f96e0720
Range Proof
672 bytes (Bulletproof)
Memo
86ef5091f6dcd4b752e4f666665e60dde57ba3540205920b0b35c99c7ad21d1891c0e3e57d67cc24e09c79699b900d142b4027bcc32e245f4346774d69d41f525dd724c5aacdc52c284c332621430a78a8f1eb0a096244ee4557eb2b36339670b99c769d3937dc46cc49190258d09793eab5f789d4610003054634f31c8a6bab (encrypted)