# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
02b988f341211ac3a49968a3cadae4a9d4b494699dfd8ef57843c3669a62ff17
Pseudo Output
6eb5bdb348ca77046cb9097bbfcab46006fd5f79f7bb9f4c0411f6fc1165ba1a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
488e8b74cbf62f7b472583e74b3ad7c11e2201a37ab0bfd64d0c73000c51687f
Commitment
cc77f352f4907f030fc1afcf67f394334e4ed50f6e51c0a22706def291b66006
Range Proof
672 bytes (Bulletproof)
Memo
1789df11bd7c5e5599f77ed00b64814b94c0c69c1b385009c31cd86ae3fff6f75585ae323283d99f5bb3b0b63177cfac7340fccd384f92dc6d8a94e1faf926b177483b558a7d92b00977e62420272f412057e79588dfff8e01a6096c80278be2ceb687f6b4e4b69d7dd1f6cc1fe36dcef48f51f14257ccd6dfac5c3d6f361416 (encrypted)
Stealth Address
8ad9dbbcf9cf3f6daf5a5efb01fdb6247be8f95be1cd9bd31e2da501d2424411
Commitment
c6825ebaae4054253a827eacacccd66c21af09f779c92bd7c3749dcff2b65857
Range Proof
672 bytes (Bulletproof)
Memo
718769fdd258277e7274191fd938e53dabbaf4d3b8e51f6f41f06bbf8d340989ffb4d2afabe10987f16043dc813d9ace6b55b268d87327db711b1187952bcc6659fc5722be00078d39b7bad8d65b7fdb8745e099aad1ce932897159d94f69bb89bcdd556a9a954e5cfbf0176ac04cbaffdaef42c867bab1849b8af94d4e5df61 (encrypted)
Stealth Address
ac8d825b230a3bc8797ce23649742b8d0f74e449cda06204f86151182dfb8d02
Commitment
8086a5b2fd2510dfe83f1cf9be10e220597da620f99cddcdc7a52c176472c762
Range Proof
672 bytes (Bulletproof)
Memo
2ae50a241c6b4c2a9f0f6609050d868d2ead19e28408df44fa2af9ffc163b8de0c6dd4ea289bba95c482d97a967864edf237b4318c795d57fb96d567ce1c54adac654111fdbff4a29e68fc0ed6241bb92e9314332aa269fa5b14ed96358fece61d37168fe8043538ee5db72a4e83582d28d686298a44350c2979c2c744c5849d (encrypted)