# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c6508ba4e496ea4b10b755b28719bc32f41d87d12b7d94dd27d0d1fce5148525
Pseudo Output
baa1873af33d01ba7533f7ae1cb62c7ea15c50df881420a7967d5f792f08c938
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aa64a9bcf1738a2a986add8bff136c2f4a816cee5d9b5d8267cdd913554f2c61
Commitment
ce543529d9b4164190717b1edd35664b4eaece99d14858ccfa61343ee12f921a
Range Proof
672 bytes (Bulletproof)
Memo
5520842a39b61f43391c7ee64b3000e90f2909f32d8db32722a4bc9ae714b1371a44cf5bb62ba42aaba11699237f8772598e18ff07bffc2562c4f9f6bd19b1cf80e34f45c7498a6a5c1870418c7b5fda9bf85a85cff602dc370e2ed414ba0b441b0d76b6af1b715b5628e9970c27d42d377a01bd467b98d1bbe9ab570fa55cbf (encrypted)
Stealth Address
6691c3f06ab59db055fd3a32e7bebe098d57966ba7304bfcc128d6f6fc490667
Commitment
aa9b9ef3790f9bc2f71012b179cb016779f933a21029aaa5d04592ac643cb22e
Range Proof
672 bytes (Bulletproof)
Memo
98f6ef4357b1141769af70f90404b99c9dd74b24969cafa692d62b07c73848d14ed16a9619753c85059306abf3026240f5cb3d928eeb0188e65596de95b6fa2ae1cad60a9af37e919e0804507f9ff5bc44227f7aa005cc3aac8b350cf4de22dd267715cf9dc3c13eec5fb7dd6d8f03b4d9e7392a09127c1ca9a5d5c27bc81a1f (encrypted)