# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a088cb6cd904899d8e059cfa9caecf1e1443905d2f9c9786b016cf8a11103e18
Pseudo Output
0e582c6b3d3607ea0ac3c34d8555df55a1ed327edf1d8d28a7f37110cc32bb4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6e9533157150c64d518772c6c6efee88888d210f0e533bc2057a1c5dde26f3a
Commitment
b4ba8b329cffbf1c482275c1c3a5212cf046460700fd4854d8d263da1ffaa926
Range Proof
672 bytes (Bulletproof)
Memo
fd669a825dc08749455e3cffbed92f08ca68f4a2f26ae34e7109563cdf2dfb6373e81a0be0e8984c34a72f3357d527b1534579f02fcdf6e0ac85fd18e2d70ac45734d7834a31756f3c96515ae5e78351b873436a29110dc271459300c8223ec4c4a020f354cc7046cef3be2d9a309ec98dfb358fb4d11d2bbc2a4f271d0d107c (encrypted)
Stealth Address
aab06ac954569d80a68313da90202cf3ea560b1aa6a4571c244411b8dcc5b85d
Commitment
0c8239f8f47a6ef2b1df532c431c65d2fb4cad8862e7514ffb51b1d8a07f6131
Range Proof
672 bytes (Bulletproof)
Memo
a7108c7ac3f9a4e0c509e784a6a5c360b8765d6cf7f30562cec5421fed9cb91fa6a72291f9e70c59c2dc65f2b43b3695c4dfbd05f1b7e2967410d74e485bdb6efdce98ee855e0978c345c6e137cedf1804f129d29d806b9dd177252efd8b24b65f74efab788d943b5ad91e68e2902d6f46de204c719b450f97c85e6e9fc3f83a (encrypted)
Stealth Address
da3a32074545bde1a94cf4c036647840d42b3e875453e12164e547e07078fe4c
Commitment
44674cc0e5e0c4c2228cdac8d424ee7e838e3ebec3ea6884af3112f42687774f
Range Proof
672 bytes (Bulletproof)
Memo
7069716edbe836970257f31f1167b6407e30754fcda5133617b96abadff55290b18b6a6215599eed15f8781f8f6ba594c88591a09b6a5a9ccd23d8db00abe4ffc5afa32408e008b17cfbb3f185d559113398ef8d8c9aef12d0d7707658edd57ce27102e9e7bc7ba6317f11a95b7a65cdbb232203a052c96f75ad5355077e4682 (encrypted)