# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4ae1575fa7832dddfad102f2eeb7dcdbe064aa8d465932116cbc6757414bbe0a
Pseudo Output
7017ed0eac6a24c7a95d13054a49828c0153d6e2f092d78404662560b46f8f14
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
92d2ab306c3685619c5d05d315e3d90c3579ef7700782428503c85272a481f0a
Commitment
f85f6e1e7be8e86c57b33de408137cb6fa3df75431452cd7e9a75d9e55e53f5d
Range Proof
672 bytes (Bulletproof)
Memo
1cbef05163a34943fa27621441608708a423f8c32ea72789d73b96672f9e37b3386aca8f57c0fea08383ff18ab649ae8b36197c9236cb8d5612c3d4f6d7f17a91e923939f102785029fffd8997737dcb72c5e89c8d288e3869191e399c971665b38943fa23c931db4503732023bae9ad31b4c204b6c0296da3fd6cafc2ae13e1 (encrypted)
Stealth Address
844d4518ad28eb5b7cf6d6515888b007f82905b27f80f9bf4dcdb64ff7897a0f
Commitment
a48b4465884ffc96b90b0abf4c9ed730c4035c93883002d039eae73b0360ea0b
Range Proof
672 bytes (Bulletproof)
Memo
475750b795e06ded3529246889cdbd017e7fa7c86ddd504583deaad6d75fe764b0237310cb7523040747d89152a33bf2f4c3ff098dce40784b0f1f8364f6bc606efa902e208624fc43df1cb5d5754ee7860d19497f25d3b26217dbaf64d892d72a9305722bb7ce436b0e7f26268062fc06356c612e643f2f7fdc363a97280a8d (encrypted)
Stealth Address
6e479d470aec554661baf4f13cf2e0241dc789417e47195a2ffb4e920cea4a16
Commitment
ac5728c10498017f6bf923521c5d1ff43256f6d75bd349af1d9c9b202793d36e
Range Proof
672 bytes (Bulletproof)
Memo
924639e0942b2263c0f199f25d0ce827cfa58998b2268ae0b0652b9ab24e5e2594b6dea934528249a7b666c4e3638f687d871a0fcb779ce86e3ab862b4fd036754b137569ccddff6b79e3982d106ccc4ee0f4672cabceaf4d006fb69f9f4a159785214ed2c6563a71d3f73e33e44508a24c8c407e4d5da9028cc909e731bb7c5 (encrypted)