# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aebae67b20892d00f079652c3f45c03235c483e3f16a8ab7befba2ae0a613f1f
Pseudo Output
7c00fa2e047bf60db8d010758d1dfaa00d4f94b20ee073b7ef3ee6abf63e1b68
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
08ac0515e3f1aa790a9537ee427eba790b3196fd0b5de559a0541550735a163e
Commitment
460b0900f124e18fb5a9bae5afbbc3514dd3905599e9db84f19f892ea3180556
Range Proof
672 bytes (Bulletproof)
Memo
2fbb3a4d612a2322eab90c6f60219ff4ddf02dafb8f24ba271908d82f008314035239e20422b39735940279c1a32a939c61465f6d80988a63fc827fb840cad82ffaca95990b79cf2744d33653346603a05da1072f70945ebc7cdb12913f13ced3130593fcd661019f920fbf5e352a581194a9ce35fa2dde608c475de428781a1 (encrypted)
Stealth Address
881d64fbee57d98b12e73e6303931508a5e09736a917b15b7e087507a64c6843
Commitment
7a8409e4f0535ffaa2e881f5fcdfbc0e1584d95e93a6f1f0c4a03b2e7b8c1755
Range Proof
672 bytes (Bulletproof)
Memo
3038860e4aef4f7807a4f8ed72c617c0200e4be0654997b1581adddc21094d7e3416d77abaef6ae96c265322d8f1a4c0e7f30ec041ad4d15e2c64247f8e09a7fc766fb96e11ff24cb9626a5724ec9d5ae886bb1f30dc09e65e8dec7e4f31856f9da29d0870ef46e8cd6cd52992e58c30c165b49b11986b544ecbee83a6809a93 (encrypted)