# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ba68a1b76970ad305210b4f3b6d7dee6e9f3eb4e9a7e0fe454e20edbdb417c3b
Pseudo Output
e62e7f23cbefef4371f1d2a0208d703a689e5df76e3f0e5cb8d93669c2d22313
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eac43c922af4d222d1ff28065e87c86ab51c96b31419a7e445fa0307511fab3b
Commitment
f46ad643f4a37502771e5f970c9bc65a7f1ec4a5c7db99b2085eb78d4cc7fc15
Range Proof
672 bytes (Bulletproof)
Memo
abcad622db691298b64ce84c2d9ac70bfac9ddb6ae565fe7a18b4769011ac451d25ff323a30900bcd676665513ddbce7605bde29e2a959ba62611e723e61974f9652cd1b66eb39d787bbcbcd832d5ff154f4ff469d864d7192102034e884d4352f296e80ea6fc20acff04fbd11dad9e91ddd312066fbdd16982e0b5c576d59bc (encrypted)
Stealth Address
a0cb9ee580a79e1d66138687214b160488fc556be1c6c8bd5c5a3b5a7247b05d
Commitment
f84b2d5d1161d2137899a1e7b28dae08077746b73fef98e98f2261017b853909
Range Proof
672 bytes (Bulletproof)
Memo
784230388e753544e28a8397876b301ed2a9d19a6c3f2450e9db5a45d34a3ba0800ee9a835f4671013741ca583ad77c37c2f526d7da0a66eada95f4d5ba97a271552e39902d61d8e4815e3d5c54e06d481af5f50b5ee03cdde2ffd6b74316b81e7760547d17189786e2f1e760ee2568aa40c4dc4d0e2998949032ef4dc708146 (encrypted)
Stealth Address
34669c242603b6c98ab86af44615e38d3077960b5b66276382309e456d6df108
Commitment
da1657018179c8644693b1b1396164c5b8e6d57b555006c0c46570156527b123
Range Proof
672 bytes (Bulletproof)
Memo
ce384da4dc709c46b1a43204381f7bef2d36b9fd530b564d132488d5b75c78248446ec333aa870e12f9f8a5631a38084aceec90f0213df1cfd75ea8271f756397688ab659379cb9940a7fe06b182220f6e59f526859754292af984ecfb848942768b6ccff46aaea378449738fe53096de24f6e9cbd0f09652cd9fc677278acb9 (encrypted)