# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
de2bc6b9f23d608ae39ad038f11ed3c1238c967e91a519536568798021303a11
Pseudo Output
f4d5e3f2ceefd3d51dc8b4425306b119128897fb694cd8f5887937cc31994340
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0b57f521d7a9b66a9afde9cdd0c3bdce6a4e00f48500bd23ad9bd1d7dcf8442
Commitment
aaba2bbbe05da1885d4d651b30e17d82f1aaa227859cdc5cc1c604b2d93bce08
Range Proof
672 bytes (Bulletproof)
Memo
6b76fd4d49986c63f144749828e42f16b3c662c7060d83b39dfbdfa10e9d4d7aee0c06e5f47498d34c8c36e3263e941dde0698b716e19fa02746026c0f85e45d8b9ece2f0a69f4269f815086838e720a3efc1b7cdecdf16370271dc8cc744a6353e94a6ad0775ed37b718a48ff223995491a2bfc8bc77a16c83b0dc6cb405829 (encrypted)
Stealth Address
4a0e48fda0d8c31118a30b0f53bd9b94e12a066310d95ff477d8fb96d0adca6c
Commitment
f4321ed853eb3fc1de531827c5d276d9d85dba40bac600532801f17f3fad8e59
Range Proof
672 bytes (Bulletproof)
Memo
dadbaf9971843461599a05d5ef316b107529768ece6ece83affc0cca5c47680d81d82e2d32041939309f37d3d14f923a43a1707700a1a121f1b789411024b865b74b93ffb4b74fc49122255b4ac754a821f158a8da811f492fa210858f087dd8ea36f90f66c97d83befbd3de73f32fc175afbaf75de54b7b97a2315ac3e56a40 (encrypted)
Stealth Address
7e640f92e467f86df361153b484f75b6612d5b1c1fdcb2f439c3f9acdb3a7c0e
Commitment
88844c3747bd9e707b4c3cedf6835b71bfc25b51f3f89740117be01939cc6e36
Range Proof
672 bytes (Bulletproof)
Memo
b9d9a6b7df0808af8a2da905161c0100f31e273c85bc7eb3524f64ab24bef8aa1d0b9819855e1831c1d1ed6c39928a9e9331a5402ecbec344e8aea157c2e3fedd307cb27a07d323b61bda944b5597e7b1b18649cf5bdb566fd49a9ce24459f1fffdb73007199904077b8db9db87eca1d5ecb38c2b7398eca244e57baa00dfc77 (encrypted)