# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e37c0972434dcc9d4247c7ee10829d8cf1c7d4765909c604e076cdc89df6145
Pseudo Output
a4c2b1dd1b1565a394d19e04ad71997e92213239a640ea5ba37df2db8ae25e2d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aecfe01077b2f0b3c9d6ad3e65aab5ab417096140813c2e4a4d42d649d8dda11
Commitment
387ebfca4a94f587670611952fafa403ba2ee707222e68eaf1d2b95134608e22
Range Proof
672 bytes (Bulletproof)
Memo
f65afefdf286c302d937f273ec018ec317e202e142567e84fffbe96182cdc8a8531390303b605415c04251495891df4952d96f7072c1a3ecd4d2abbfcb6b27ae9fbbfbc65432e79279ffc25daafb11233c3762aeda1dff930bba71c69c703adba5a6bcce5f70af1a7551e70c834f933a5c05e4bef7e21a0b68e431950caa7570 (encrypted)
Stealth Address
a210e7a8978a58c5bd388884b3e6bb92c0ff435838b792ebcb020e4661678959
Commitment
0a0ada1cf84787de5b49d341915d47ded3dba8c917617136dde2cec56db8dd6e
Range Proof
672 bytes (Bulletproof)
Memo
0205546aa91c41038f5669e2c0870595ae2948a96cdf82e07b8f0a8872b284fff32d23690a9a08bb31ff67900d0b5d38d576335e69b726c900d5e928eadb1976752fb3329c9911b2b0ed7a7fc6f6de5de33bb0004ac9bd48e72a7072576229a77587f7230052c3101285e2c5cebc11c95d973e7660d0ec444a82e82702642899 (encrypted)
Stealth Address
fc03eb4e8424fb914ed81547e674c48a619ba5ad16b681dd7d2190a1fd464761
Commitment
02503f5a263271959fad9fae3bb7fc208b28612e374e7d9baaba3791c2d1106c
Range Proof
672 bytes (Bulletproof)
Memo
9e55edd2ffd67fe455356eb58df01a52fa57b47f90ee143c2bde08f0e9b7899f7751657bd54a9beaa6b0b2cc2b2d9a822fb82d5899d92b35be22cc55e9dac8fef04eb1bbca122525a06dc26478297ae4fcc03a4063829e72eb720974b113562163d029dbb85fc130ec8f722df2c8f30f07e166872284cb3b05cf58d0889d17fd (encrypted)