# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8a66381351a3b817e882ee479f52aae5760d19f0703fcec34c9ffa00df5020f
Pseudo Output
a8e6fa381d550cb26e78a6da7c846c5ea8a4ac9e54a765bc5e60fda173177616
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a58281e7b013176d969ec47a7656ff0e321c4e70ea13cbf80c42c5daf41c310
Commitment
b2daa02cc164f3c7557f3122e589366f796f56c7c9b50f2d90e4958d562ae232
Range Proof
672 bytes (Bulletproof)
Memo
d7007710b84a18bca23e57865ed3fa29b75455447fb9e423818431769b91cafccff6f36a007791d756ef773c092d12d7568613313a590db856d4549072eac400c1abc64470e5d7b3631b40cd5ff0ea108161c89671ae3db444596e4070c8b2aa6963fabc38aeffed27c512fde9ea360279c7643d172d4d98973a6119859c4079 (encrypted)
Stealth Address
6ca2e62a41e5104f0f09ffb7cae21d23f184cbc1580036247aa54056844b314a
Commitment
284c643c3bc066e02789d92c54e51acf95d1e521a0e99ccefb4d813386ef9e5c
Range Proof
672 bytes (Bulletproof)
Memo
1975b29c380809e6a7852ac90be5099c04426c4bedd6f29ed3513c311607f4e83e8bc4f8c5a5767f678290f42caf08976472b6eeda903f581ed374b66e12a9d9bb8948cc3ccc74debcee3ac64428338978aad06b1915748a94f85509476df3de747010ca044590d4ac6df51841db3218196b672e72585e47c85aa1195619d136 (encrypted)
Stealth Address
547f087e2f99f80367120b46987e166a2d90077e2a741f49fd354a20a483cf11
Commitment
f4686a5f8b9271e9c709952339fab4e0e0f3679a3f316b4b8257aecc4fdc731f
Range Proof
672 bytes (Bulletproof)
Memo
bdd93f5aa574db6d9a52bc3248c88cb02c3b46c35c35fb2a7d4bd3a82282f3573ce8a2cda3593eb82055e2e40112617b04ceed16317a560f266f27ef1498b5dbcebb6376c4465cfd48a4b8060af46a4e0010080ac86fc99c80bf22a76fc784d83446dd5e97919c8a3be01c9010163113d5dea3bf01c949b2334a085a305bef50 (encrypted)