# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
788de38827db85b441f600864134504a8c624b3c60d89b603a5f79ac58ccd854
Pseudo Output
2aefe8b4cb56bf193981be5e30ca82000218748e79b3485b3bde4aaea2165660
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aa6580938d201ed4e3a836a31c128cade552061f00cb9217fc9492dfd3568902
Commitment
f40c474580025b1de98188e9925ccd7165fff40d5a017867f3b9371e30111e6e
Range Proof
672 bytes (Bulletproof)
Memo
8e2e13deff13aa05b58a3037dc67174c7a0728463581bc0fe94d0b043e04cdc10afb7525473b7498375c5b0577d76ab54ab1883963cbd07221c5c4ddcb1ece1fa37e8d69c0f2577af7799e233ab9bfc854b2dbab8b0f32300e15a641d6393698f0bc6959eb41d820ea8fb127dd3824c6327d799fd55ed86b5f10453017f00309 (encrypted)
Stealth Address
a0cb5333894acb5f714525dc2a6113cf2508a58ede1dd543a5eaa0da3d1fc32b
Commitment
88f8bf92f74d9316f0bac6ca988767fd6f88526eee1b3693a2e90095361ef975
Range Proof
672 bytes (Bulletproof)
Memo
cad8f3e132abc46b8c9f72edff42bf4aa2c8609f4177e9644fd4f901e1dc209f83bb1d0a03f52325b56d40b842458492f8b1897f37c7a4e9157625ec4b547a3336066412fbe2aa35076b9d79434e0b5b5ba3a52727ab3c4c54fe05d10551f54d40feb3f9380681cabde835b78f0344fb049ea429080b0ec09ebedb9872cb419c (encrypted)
Stealth Address
c2689178fa2f6d140965629805b079b739056a34076a89849d3077528fd80455
Commitment
bceb488e5c30640f8cd47a6eb351e5e9ca375f2e27eef395a611356da227aa60
Range Proof
672 bytes (Bulletproof)
Memo
39ef61592aaa8a328a66145aeb34115a9bbb99843d798f2ca3a0a0c198f18bdc083748ccefdd294f5dea4148396d0da55d96407b404656461bab6777c27d716c3e18fa961ff04bd1032f312cfd07f8e5b88ab4bf20441ce86f6e1474549f707bd22027639025c887aff38d41c1bd6b0e7720ce609b343e19166d0afadeb8f7f5 (encrypted)