# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2ac7f6819286db6c415deb8960d7f1b364f2a8dccb65a7087f0ce39f83c5b452
Pseudo Output
aa8f969872c508dff9c10dc9bb5fbb6020e0daedb76013bab10e5403c422563c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d0bfbb7d616ebc8a6c086d06d317f48e47031019f3048b8070eaa77bfe67b21f
Commitment
ba9b5ec0adba62bea827f321f54e63d6c913f842b902d9f2bf83cabb43793667
Range Proof
672 bytes (Bulletproof)
Memo
0f1be77cc7523e3055bc7a0a2c378940338476739c696ac41ca967a77114a841a4fc398236df36832e18c3daf64983c0b5a10fa72b3372b7a6cc1b12e45ca6a1a737688bef7b6079030753efa01709116edc239aee614d7c0e0d5e48a85ff9fda4057c0e1f2071f1f78e83b72414fe264f818e79829b2783ab1f3aef62c54c22 (encrypted)
Stealth Address
566a4a530a07ea45792c304bc3ba1273357a3945c6a0129a2de78981d5a6c211
Commitment
aa9bf91610265bc6f1ac2f4e196ef35c8d01a15776b36fd662b766c5986a836e
Range Proof
672 bytes (Bulletproof)
Memo
a00505f672f7a841126f556882803f58988c4b9d3186db47d88285cc44ee2cb394d2e6bcb957a920be6ec0c90903226f6f9289a32833b3cc330e05c75fd833680f7c0ae285ad820febc83b1d48805984f48c086e4c27e0c484906887334b9084e3c13f451c6ae053bb79dda3a16ae93e5cc1b37f99f037644c87688c8c6a2859 (encrypted)
Stealth Address
96714d9056b86138aaeef3cce1b99b570c582c5c2acbe52fc1c036fdabf7b133
Commitment
1a16e78af6a696d31ee6c3c24684ca16d38771c7ef123a18ff631181b67b710f
Range Proof
672 bytes (Bulletproof)
Memo
f499e9b8a1f25486c4c1a1f632f5d37d71202c6275495d2bcb9a8328b5893d6ae585703bad7dfc911b384d1239a7d1b29b8233678b7473065575d339bbf3dd8ec3b77da0f2bc89aa323d48ccc8e00192ad30089074635e2b446d315fa7c795d169b08d96c6cbe400e523b5aaa071b13c4584b8645046b97aa89f600ce120f729 (encrypted)