# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b0b1b4d991cfb16a4e56f4b493f1dc637ffa4c5c03d407666ffc021a1d73312a
Pseudo Output
34ad5318360a3745c6c13af2c936495ef3ef241086c30caf2972e919e7721a44
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a4b79e959a361a648c3cf4dfee0d1a18246ec5d990dd3e31bd9736b4236bb44
Commitment
b8425db3d3296d513514cc660298d72231865f3fbf6afa0a967b22eeb7a8a241
Range Proof
672 bytes (Bulletproof)
Memo
92e23b9aa8086f464feabc8b3fffecd467fc323b3af258418e4fe3bcf0975ed17656fb181c19723ddefc71a9f5aac3f5038f96a6e95dd15977c7ae4b7ef6f73cba555caaf6594cc3dbf9cf7c38042b3c337f9c91aced3e82c5051e8eee00fdc8a2fe1681077a1b852bc0eeea8bf43ba21343ccdc07f8e6a3593e875dee6aae5c (encrypted)
Stealth Address
c649d058c2d9e2a2c5dc93183c8461554faf46a2be8987c722d3482e954a4e17
Commitment
eaeb9a8961ff2929ebed3390db785cd8705cead56c224bfcc2177888a10d7548
Range Proof
672 bytes (Bulletproof)
Memo
07d071a1c98dde2292738dea66943ba5cafa83555ac791d61fd9ce6cda7b5daece94942da93390386d6c6085eaa6d0edcf0a87888902f9ddfd582c14116967187a3274ee5a0b7cebbbae6818212756d89f7ab87cf25ecbbfe4ef88a8fa5f25b27ca183f8f0b033309789bc67191d09ce1077a2e8686fa9bcddaa18a2b25d5265 (encrypted)