# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
686fc0134f4d3c826a414600b97d5e3a5babe056b73375ab4ce3620e4cbf0e2b
Pseudo Output
66648ad03af736ae8a20ed12370f51c97253635217f317a1daf3de3a9c788307
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aeac8414d2017dbf30ec6ec2780150df6d461f41b5aedf90328cbfa6488cb763
Commitment
3497aa0d1f40f45d06ffee0c15e322e555fe87d8fc2fd76517d501c8b4f9fb0f
Range Proof
672 bytes (Bulletproof)
Memo
d2a2acdb82a2496d0f46880ac8a7338f31aae9f544c417b3882e0b4acf3f7149f1d79e48526ab4f56518ebaf161a2662e25a2a8584a5a07928b15687579190ef7fd2c25870d0bf0f088d82737ba6ab81f6db3e7c21fb4aed1cea4574893b534cdde8e8b0b6f0ad2293137647e1f1989805fada27bd7dd9355a3f09673190a2e5 (encrypted)
Stealth Address
8c119d88b96fa02dbaf583714899afd5a3ea3e582e0f6d63fa18a400dffd5a62
Commitment
862eade3fdbe79ca61f998c8f907bdbeb7be88f387b51d03a985c601d4df6e19
Range Proof
672 bytes (Bulletproof)
Memo
5421bfd8cbd5a1feba820349df8a5786b648ba87fedd1b4844ef39fc592e775c6ac5188837c6badd69c06813114ef64d81a777944421a91b048095201d4da53e04965c816717a6f5a31c548b7b779901024ad204205c5d4b900b975f7f207374cdac316309fd499614d722590b6d4d972f7dc6f415cbe50784edd6238699591b (encrypted)
Stealth Address
be9d9fdc0323ce0a06909b667e6059eaf1d9dd0fcb6e8180306ba80d27ac741b
Commitment
8ab7c5dfe1356258cc99bc12e6305f0879693e999bf66edee50d346d149e4830
Range Proof
672 bytes (Bulletproof)
Memo
5cddaf9dec391872279c7973c519245f704990aae4e6db719ee181274fa3fa868204c1637b3fd357a439da84a07bb274a899d2b4d99dba77c9fbf3ad3331e874d33c473237bf479de38d1e2431a8ec5a9330e599668ceadf7797b4117b5e0ad751dadd59741814e591085ef7933d02e86347265518ab217a4702aab4f6b19790 (encrypted)