# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2ad1e26bef9fb477451aa70ca9e8f5235487ddfffafad43666e7b257cf09c347
Pseudo Output
92464f1419e195e1ff64bc8a8e6d5da672bfdb98b58afa25c2786094620e927f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aed099e1699dd84bc1700f3beb61b19a5e2a78888523919bb2f92ee42ba5f034
Commitment
6ea3aee3384f457b0d56da13fafee09e4439c7852cfa516d0cfa4c8851a1155a
Range Proof
672 bytes (Bulletproof)
Memo
6aabfa17b3e0e550b34fa5cec9ce3723cd6532b89d66d6e14a139ff8049df45ffd7335969d6894453b495572d2868f51d4e525f45e275bee0045061cdf6376923c285dc4f1c1702c2e812a37e504dc657a7978460abaad6cf68a46500df0e9003b92370a2235d24a667ed2240e0eaaf015b967e8af8cb8ef4d623088229e0848 (encrypted)
Stealth Address
94a8c2c20cb577873c8ec5b8f70d2f152e89e6b8c5cfcb0046ca87a43a034f28
Commitment
7e28faa72d3a0bfcebf3cdc8fee464070977f0ec9e87b274fb50cea36a8e4f48
Range Proof
672 bytes (Bulletproof)
Memo
4a18e8ede9e44cc11f5579f03a5b640bc7f15e37b365e157f6572fe58986cc1957c9549036a93b0b3e704f12d5a02d7d815503b9505ca23cb89b3d542ac01f2275859687b435f6bd00cc433d32e14ececd91b5578f51b78c68e53ab5b2a24c1ed7725b582cb833c75641a6e660534517eade8d8f5ac44deac519b01cb3a853c7 (encrypted)
Stealth Address
fc44c416a4df9232bc0fc4660f5e87cab0a475fa816bfe97380d28fb54a01357
Commitment
8c514a0ecf8f64ed4d55db62b4355edd80b206e4041e5503c65e2b09643b1718
Range Proof
672 bytes (Bulletproof)
Memo
6a8a3cb831b238dfcf1ce6120774929a211fb9abbb6b6dcb5c7789e9a56fbb2682a61fea8fd14f5c7d3b8e13c38b2d39348df11426a0708d76fedfa302bd51374374735e8a55fc1611ee6a02dc77ef61a65ab2b2f78d864af834bef31b8a6ce3422b514c49c36f5934c73b348c89a2ccaa201e831c3b3426f775151b46162199 (encrypted)