# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aadc104ebdb22256c6e49d25635e8987bfcd69a5cc858ce2a27034b4da8b5d4f
Pseudo Output
92430b9ea073f9a0ed00e43c2547dd4b03e9b385fcd79345e3b522ea6f24d628
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
906517e250311aa2fda73114b7f9770ffcaef1f1737c1ce8ba06ed88e98c9d41
Commitment
8066d0ce843df0c7134c12ac9fc03622e459d02c6ff7567e9b7d87697fc97846
Range Proof
672 bytes (Bulletproof)
Memo
ede6356f23748c290f60ecc07e2d1f43b0e3d78a2ab1dd1430f82bdc32e5aaa6a9f54ab25c77375ee6780370dac374e5444ed1b438ad91b8fa7d90873d8e0ee9ffddcf1fa61d56c49e40a9b45d875e8c062dd035c54c81ff45de2a99ae0686a8f65a69fe10e680f974585ced20a18c4d36f20523a1f6496234996dbb53029f80 (encrypted)
Stealth Address
bcc2a83a94f85afd864807077685f8c6edbea2b25b2779e113f92f305d5e1c56
Commitment
ac413e50bdcb97e1ceb897ed6c9b385bdb8b53b84757ac62660440565e750072
Range Proof
672 bytes (Bulletproof)
Memo
1ec2a648118eb94d3c204c8c111cbc28fbbf579e6efba2a4ec3fc83bc1a4d2db465bb191bc9d17ca4a8cca19e8a24b5d472126274a4568e0fbcbddc58b9d759d55b7453e6a25d56b6785524c1e29ab3ca563166955c674abcf9f49ffd302b5669ab1b2e98bb8e8369a0d8e7d26e8407d9652192ba0a25beaeaeb2755d6b7e9c7 (encrypted)
Stealth Address
a898589df83866331b64d191ab1d4b30862e3392cfd7d185117ac8afda72c253
Commitment
1c7fc5424a95dc752476e4fb2eb061b538f6216e187854e7ebfe83533addf06c
Range Proof
672 bytes (Bulletproof)
Memo
3e176155ce5b3f5e461fe8e9c85bf56ff6069f77908bd4e82e5ef8c67b64262ec6995292dba927ad3072a23dac5473eaa5bf77202897ba9cc4760659df64e261d1daa794606a8f334245a4406dc162c16be1b95bf0af79fb4e4f94040ba6894cc231603f5dded59b9f194ee046ee81f1ab823d20ecc4e0d614dfaa41b4845461 (encrypted)