# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38eaece8d97f8d03ea1b57b5d53d284a9f8dba423ff544e89225011ca0f23b33
Pseudo Output
5651c87868a14abae496161ebc0f21aa12bac104445df86d19eb6e547a650f2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1aa9f5c2f701c61a0247347e1807dcdd7b673b8c283a8d478f330da3382fe040
Commitment
c8d0d5c244a2b87d433131c222b9a8a2f57818aaa6e2e34137a6ea92ce3a0d55
Range Proof
672 bytes (Bulletproof)
Memo
5837e658d032b27b7746b49a59e92f8182bc751ddaf7d601f29638fd4f6732ec3168987264dc06172c4f0ed9cfed4fadbceaaff8ba93b07ebab70eaabbe53b27e178a111e658eb3b0c403177fbfedaca823c698d068a59d3d92ed3e1a2e7ca6688402dd6bca92a60de3fbc57d91f7fa526cf9c78cf97d1b0f1bc73fab3ea929c (encrypted)
Stealth Address
428529c90c6bae333d5f7e8319b3ef10aef292cc62a447dadb9233254ee5164b
Commitment
ecebbac170d63bbc66e2803a01a78d59e3fba9c21ba86c2ff327de27865f6b4e
Range Proof
672 bytes (Bulletproof)
Memo
939e9ee081773ed13b0adb8076bf6b455d4f00dc85bbf0ff6452a85efb3554266e2e3050173a0b4288398c13ae61f015a8e3e229a82a1083ca4c2d5822a52e9704c4ac468b48cc926ab9a20efaf07d7a5e28b4b9075c195632954e0012f7505229c808ae72bfe83a82f6136ce693b60b7a55bfd6cb577b0e48a1aa0abf7d508a (encrypted)
Stealth Address
8acacade59a7a64c9b78690f62394d70e00dcd246e432184e89b57e746e97967
Commitment
5e0d00486834d85f47eaf5626383784b905fd0aaabce91aacba00209f2ceb33f
Range Proof
672 bytes (Bulletproof)
Memo
568c6110b6769dcb7e49734d42de2c4dfe19b38df10feba2c9dcaf7c408d829663e134f790d2b96eb845a552166780860663ffb2ec45356bbe3b6d36463c67ea38d32ec119bbe5dd2a19d28f5324227b9b9953dc1c51470f95fffa1813afe91b4a0aa71d9267939bac48c59acab87892e635ec77e38116f8be44cc6573715eed (encrypted)