# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b2bfcce339032bc69e60efb414ddada1d06cd5dde52f2c33f6b247edd988c072
Pseudo Output
3c89079532e4a009e2c3ec6f74d6a5d952c35c472aabc147e3b7883da2ed4148
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aaca30439661f29e31fd3d41ad0e924c81a3009cb1ee13f04a30fb4c5a291f02
Commitment
bcc4c86c7701a5eddbee5f8b5f9a3d6cf573ce64e4b664ca364b8c1b818c0568
Range Proof
672 bytes (Bulletproof)
Memo
72b455e1bc0d87b49935d91451bd58b80a995058386f3cbb6ba91f930131a8315f52d984a7b1559e7929a33193d807592bdeddb92a72a0013de9d4fb827c5032d53254b2fa6b540387f312e4a36c8adef1ab2e5d1617d2804cc95547a839f19aa033063d633d823e4d205e17da96cfb4374e0c8df27b781b8ae7292a3c77e0af (encrypted)
Stealth Address
ba464ded8eb2ab4f106ebcd6ef3bb4ca187531f336280d6f1e11a10db004a271
Commitment
d87206c16de6aeb52372277308e4d39fb27dc3718cdd46d5d08074d1dfc85237
Range Proof
672 bytes (Bulletproof)
Memo
014cffaccfa9ecc45e62449469e754dd8679fb8e514f98cb84ebd768f34bd7fc52e55ce2d1b74540c35ba911431e9d91ade10a36c37e52a4b99ef482cb59ad0ec7ef2298f3252d2f18e15e79e15481de6da87c24e8212e294eab1a05d79d8f570b5632a1e53c13910e5d095c14fd4f91e104ea219853ff222eb4f53beed931c9 (encrypted)
Stealth Address
b898814f6b3356e53994772ae3d1e9f44f25db7c73af1d0a1aabd9a9386eaa17
Commitment
f4fe252f84c483781ed0fbc5915f9676c313da08e40c5068fa225de8224e4e09
Range Proof
672 bytes (Bulletproof)
Memo
b240e8e90eac0d6d1d746127403e9fbc6f33e8c136c7b819660e245d834e369ab662b2f65120a2e0554c9ed938bbe29e239c95ffaa9acb7145e14403da6acf4b23e4d8f7d42fe426bcbc04e2b978cdfef614fbd601602c628e0bbf1522c56351137cd1590bdd8f2d61d4d403bf7691b6797a43d5b0b6a722c97b11efd2792366 (encrypted)