# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6ad5ece0aa61e3d035b3f876a95491ac195efbee0e027d77da8e1256ea93571e
Pseudo Output
f623c98e46ca7f3a4228aba75d28cff586e883642fd4007169ea80141f106b77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a84ec69991c51450e8860d8510bfa5f0bba90c539923a8bbaebfc353c74bd31
Commitment
fa3a7d7ec0a6934f41527da526d60f6d1851a814e3c6fe8067fa26a22f545940
Range Proof
672 bytes (Bulletproof)
Memo
ff7346f5c52065b9bba487f3d072acc7b118df7cbdb8787efb0b18736c5c4681654728f03298cdfb35dd603483ce709404caaab13a1b5da9e4f7137e6f734dba8e2c1a3d07526e8742abf3f146f5ad2f27f5ab804947662350f84aad0e4a1b5cb122642ee07f8b05f47434c929efe1fcf60949448c54707e7ba08c6b4cbac4f1 (encrypted)
Stealth Address
8acd48ed203f9133f7c9b9b02888f7cedc4cb3d5a319631477e96fdf29d77931
Commitment
82add11e920ff8caa86291d4dfcc9ca92db593ed1cff90dd2f0f58158e99ef60
Range Proof
672 bytes (Bulletproof)
Memo
6681ea59dd5be10f179867b8726124179bf14df03f4d0dfc5ebdb63a6ea07c767de16b0d8eac5d88b1eff9f93237eeecbeb12c9e3da1b96c6c028c7c8adf58fa58cc29883de8e32316dc5c7fd17124f0f7385b71a82525aaf787665db21d027ec25f9e61375da9bb4ca6ca37e359f9290bdaf8d25bfbe4f48f57032b344e75c5 (encrypted)
Stealth Address
c646dcc5c038ffac2521673c532d7ee61a321c9b0e393109adfd3b8eb00e3214
Commitment
60f516b5f633ede2d6f82ae338c1d09364175cd5d02a8ea48a98eafe0ed6527f
Range Proof
672 bytes (Bulletproof)
Memo
73c0f27ea00914e15384a6e2c15bcf2612c0ef8683eceb24ead632cb0251f486fc39c7f6d8ee82982542d37ebc76ad984416cc5b4acada1f1f012198a711db132771a9b022dfacec64e32b671b5431e61ed96aa116f4b8cbdae42ba6b4758a28b9d3592593f6e0b8559c942bb50161cfc75c1771042f389f027b74759790824b (encrypted)