# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c7a1ce3371d551d48b98702ff79c04d1d4694678e41b29b61b8868900b3d250
Pseudo Output
7271bedc95f7adf857e8a96db5b21be1474c3ed491f52290e3e9a2f60bc9dc14
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ae17da737847874212be21fa256e4a2770543041c9b45c1320f27193d2bd482b
Commitment
9c2cb9c17bbfd6bfd87da7a618871c14d08e51441b3d3cb7832a2c386a74dc60
Range Proof
672 bytes (Bulletproof)
Memo
69d817d6c63843de886bc12db2750ad6c1d1b2197b471c492cd7d1dfea48966fa3cf5539fd4f135be43c9dac8f17b0d84544c77af6623d505342cb62ad7f66e47b44afddb90553abb4f8a091e2848168f46889a9b7abe526c5973b0b5303b35d041fe26bb4d9d6c184f1a854231e84601ea4568693da5c68eac9dce9d3e1e7c1 (encrypted)
Stealth Address
84fba419232aa700e70afbf2396a90a8225ae9e0ca1e0c406970a4d1bc595638
Commitment
c872eeb513dbefecb080e621a377f17ac3fa02f12139f12b93258d1139ca2e1e
Range Proof
672 bytes (Bulletproof)
Memo
3b5bc075ab782cee0dd727626e01bf249560586d29728677c41d5d24e2ba4a87c7992ca8d3aa723485cda95f2375ee20e2858c475a5bf989bcc7aae2afcf779feeb209f888f26f854119b1920b27a63b4265881be51401022e63ec6e074efcf94f197537483e28ae80fe7df5778a758f39f67b219c2fd8f480512548a76dc7f4 (encrypted)
Stealth Address
84eada8c0ac28d0cbfea576605b9d48a2615c68b5467221bbd658333138a0a03
Commitment
aa1e6994fdce93c83e0c04d986f760f50ed71bdfe8c112f4ec3bd6cd6d2e6f2c
Range Proof
672 bytes (Bulletproof)
Memo
5a9d267b145338fbfee8f47cd0da5d11a6b32796602cc2c25fc1729b6dd200832c07a7e3fe58a31025ed491da5a4347aa907ef0f78f42f52e6a6f2b257a44330c07d1de4a58188252d78d327ce38482ac55546fef8ee1634f067b942ed5fa40fb2efc695e3be489818d2a2949579c43caba26dc37634d4fb3671ff2469e7521b (encrypted)