# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8d6e9c52ddb3cc6c398c2ef8c2d847d0e85cb893a20425d27ac1581fcd9eb30
Pseudo Output
48ec0344b354fde93019b7806fa9a8fb475c829bbfbfec6c00ad37c6a4058f2b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
10458a6e2b01467dcf43eb92b5d684ea9e2d0f25d4e97a63eb73d5c41790ed32
Commitment
8021dded90cd5532e054d95f6a0f0195015e6efefb41466e8ba733a726641c74
Range Proof
672 bytes (Bulletproof)
Memo
7082ce825bf3fdfc3f64320ed6d02c5d7803f945ae3801ee9b32d6b1420d517b466b598d5664d9ffb1ff939d2c382d30468dd9f107d8aa31abd0401663a03329834ba885e180dcb07dc9c427817e97e1106deb4f7444da0ed6cb6f1859b7c2260867e0470920575d3abec2a3e9d75f76081d37e703a7b7ee70ac0e24b758449f (encrypted)
Stealth Address
0a84c1d48038de5ffe96fa7d648d46150d6b7a68079e70c395f81cdac9d34213
Commitment
a8662a928e0d5acc90753d404d7ee1306d5f59d40ab3a4597c932f2767a94466
Range Proof
672 bytes (Bulletproof)
Memo
d8c699f1157cdb41a9bcd6dd224fea959cf6ead032429b967e0b4420393c5e25e39911cdda6df43d0848ff36fe4d918f4b2a5d783ec87183507b36f02aa32e1dfa7462f9a3cea2606dc8372580379ac3db685c5702dea561b9415101a97b2a5150cd01cb60451458c035b45d0b955153b53dcd333db42ef3cc12653e5061f3a8 (encrypted)
Stealth Address
9e64b3f5cf1fa411faab6be6f86cc949adbd974a6df3d4db271a258e6e75a175
Commitment
48439fad037dac0ea3ff9c16ad7eb488290c5bfa516255e0a9efda7ad16b817e
Range Proof
672 bytes (Bulletproof)
Memo
c2098afec9477fdc00cbdd6441f90efe929d70d90fa2688825252e2ef70577a23bc85a6a1832ed30802d447297e7446d218b2800b8a40c163eefadb4c3e714a00e777c3fc9b7929ff66586e8c751f17fce65c4605eae7382726fbfa6fcbc6b3929bc86007b99535f00950bd5f068a236326b70931f10ccd4680608e661c6dcb9 (encrypted)