# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48a6aedde9df7fcafbde33460f814e4540bb7b31a64bf89b9a763d2c2583745f
Pseudo Output
323b281aea57b8314070d94f73921e1d6499dfefb7ec6cb3c6edfdd434e5ca61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9aaf386dad9149d0dfe8f4d68c49031c87e1c1bfe258cc68e84d30562300d916
Commitment
2405787bae46e6acef3b6a6eadb40ca599ba13c0fdc7f386c350a9a43c1c3360
Range Proof
672 bytes (Bulletproof)
Memo
314dcf9a0e357e0eed8ba4ec0ac397ec78ca2331e957cce14442da8d9d5322439616f2cf5f428224d98db53b5cabf3ad12304f4115410ed099aad827db00a66ee204faa958ad3efcf239dfaae94df07bd0796755167dc657976205654accd60ca6fa75f3a70ae2a9cfba0aea5b2b32c3b9a195ba985116940971281378e6d0e3 (encrypted)
Stealth Address
a0ff2dc11f92df71500663ef1e250b72d6fa77862d9024928be9d496fd802b62
Commitment
e650af09ff46e1f12a79fee1dd6774719a443f9fe467c8263a427b7724d1ce63
Range Proof
672 bytes (Bulletproof)
Memo
2f81abedc846b97d8b3cf564a994c48585dc694508b7eb6dd4d27e79108e09ba17474a44666facfec286881093a41829cbb25d9332f6c853272e1935d357acd90d24b6e74ec5ebfedf9ad6f0343c122726342a96832602238d14f6a8846cafa15c5a4ba28962dd8b9ee3ac94e5b46d45ca903b86977c3c5a4cbe3e9a74bb6e95 (encrypted)
Stealth Address
9a5b65d2d9a51c03d0cd804d10f08e50e18ec16c9363974ac38795877f51840b
Commitment
9226d03f9e31bc5a8760d71f8211d4cb0cce0058654b028a16d2f82231bf1609
Range Proof
672 bytes (Bulletproof)
Memo
cb70b6b71f31acbd1791663dbe18569dba7a29e18a6faa33bbc2ae38acbb21da4448fa516d1b2db7847e08f009def7645eb496666e800d667591d7dd38687236b358ac5c25184c4b81ac3667372d04422302ab132cff75e444f84c003088e19c1d83245c8886c3ccd69ac393d9f934721136d8b3e32e357b09d5b7d305933b45 (encrypted)