# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1afb8e7c2f15bacd501cdf4559d23c7b2ab0ff7599d6c54b310ebe1d52007578
Pseudo Output
76a3a48d804a6da63edddde2a9f7a786927ddae84068aaa9f9876cb318235d14
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2a77ddcd27ea4604e5485e86f8db48ab4365e38bf4c37b6f2d2eb8ca255eac2a
Commitment
0cdf9e070b4b7b9c93228af8bdfc926399b32fc61a793ea99ee5cf70c4fc797b
Range Proof
672 bytes (Bulletproof)
Memo
4ce9aaa468c9eda6667123f006af83bc91827718079223b668db13d7fdb4b15373a41e0772f50b4f9a38a85d3ff0ada0d921a9eaa5d94537544f52165e7879d5fdb399f46a939d2e4ade8c9743ab382dd53da4c52f61c6522808b47120462057099e1c8f4dda9e277d1a87ab3abb9f625c99accf22b39c0da9b1bbae9ad9f6de (encrypted)
Stealth Address
10a17822549160390775ebe5c4057d7ec2e06469e2c9d59404f9327b0bc44d46
Commitment
e284229f2e21f53b5c43fd3fcc0085ecf1ee0b9c2069c8909a4e2d75c8fc402b
Range Proof
672 bytes (Bulletproof)
Memo
fcfa0c9e059c7a46dea6c4980f49ec08991e28db3eed5270bf816c03133351c25d50a80141ddf96d251384a26b56d7f720fe923a4ff78d5febc312de3baa2baaad96fae22d3fef84712d4f1a05d6093697588ca9ae1f664f5b2a5cc74fe3078e413cbbb6b0812ad0e806274c5652bdad41916e44f3f3ab06885484c0fe9bf555 (encrypted)
Stealth Address
24fa5aab3f06e8a377e475be4954844628cda328cf0a70aebbb018db2b3f324e
Commitment
7e22d0c4b2ecba3eecc863bce908ad8ad3b9c469d83fedc39b78cf889e1ae328
Range Proof
672 bytes (Bulletproof)
Memo
95c73f1450bd547a93ac4608916d0349e1710ea06aa26147c858fb0ef51b89f82ce9023fcc1c3ef0ff450891613f2daab88e36a91aa470d95284e210e251be34588808e613ecbd0a2ee0da595af87d0197867390a5ff8fbbbffca864472884c86cf6901d0cd0d96a0a7564dc7885c0b7d7c347bb9e9896aa39136d5bd00fceee (encrypted)