# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b611344559a9a1db9ab08190b3ed7675881d4f26cddfe8e7277b0fbea210a50e
Pseudo Output
b0ca74fe4291e5cde33acccb37af1b22a725ead5486acad117e53c79fc51b81a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e08bf96015dd89d4a77c40c74ee7f3d4b2c145cd3531faa22dd8c8ed6aeaf1b
Commitment
aaa959a70e227a0f2ef0c3065649deebb37eddeb184a631c2adafba4c9bfea02
Range Proof
672 bytes (Bulletproof)
Memo
d6138ea3aa2997b7cfd37098783cd391015bd68566b5cd72d43436a3294e7e7f5604b6bc193fc84a2c5e0d92c08071872d7ff288e4140dc025f63e85d058efb685c4c10289bc4ce7bc19a3e8fbc508a290a80ac2391a9644a0b228f4de3fead4034786aced682531d0d37b052ef4ae047fa8dc20931e63bae1abfa33e06a9763 (encrypted)
Stealth Address
a021cdcf6f3ca8f4f62cfa5ffeb81a2afe7210d14c4dc5c57f00f805c3426d65
Commitment
3c9f5345362eb27ad9b3361d8af338bd363cd61cb25367e895b22ad450c54629
Range Proof
672 bytes (Bulletproof)
Memo
d81078b937fcffa03547ca4145824b013f9db473324e54dc0f352ee3dc8e933bc88ad291511846259ea653adbce9d1691a947a7fb137bc0bb5a897df63e56d82a4f6dbd2f08bd6a6bf6152431d15218f83adf6cc58f4cf43296cbd703e9718e236a1fe4528f568effa1c3bffe95f5881dc83145a9a2b44044ea6bc90fdb7630f (encrypted)
Stealth Address
94ffbdbd01e603e05ba7284f988b49d134f6c4b0ce8b7cadc2ca7874a4829b7b
Commitment
68598fc74306e09035724f933432259338852a83f9f53e0162b786265de5e857
Range Proof
672 bytes (Bulletproof)
Memo
286d8bb7ab5dd661409ca860688a0162b0b97236737c99d5649461909abbfa652411d157ec99314ae9956dc70c43221ac49effc73660c5f6934c3b36154f527a3f2059ae2593066b7844be66c2eec02f4d4afb22352440f06f88c2f05bcd7b9e84c571e1f97dce3444062996db883ed12388e8a7b54b5716a1bbe8e204500d43 (encrypted)