# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6aba4a69267d836bd284e7a80d7b00acd4d8059a6d32fb4fc9f89ebd57d9007b
Pseudo Output
c8ecace3958b45ac634a3b961610cbabc23765693df06745177cce90015f507d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
860567c8177b819115f59815e77deb23998d1917b2452281bd694d4842e6fc2f
Commitment
2cad0bda08176856ce2326fea92d93204d74910d083186613aea6720e541e363
Range Proof
672 bytes (Bulletproof)
Memo
58d9700f00437fc9b2530aefe60eebfd039ca01d08c366f0cad8c0101c083002735b72a2b09554180eed8d7b20f204bccc9745defed20fd31e3045c35591aad3f84855c87f8bd64072980d1b4c8d4fef77688bf3ab17460030aff1f07402a99941a66ad61d7a7061f520d027b6b3edbffc74b3cb4124cef3ed3e2bf54965e470 (encrypted)
Stealth Address
ea4d562d6519359fa4cf895e7e87f6e5baa2563aafbe233ea7663530502b232f
Commitment
caa9332d33aa11456255d5eb5a8ca13d2e382adbc3a2b9d77582f4de40575f34
Range Proof
672 bytes (Bulletproof)
Memo
f4e91267887c002a24207b774bf3b0e8c84bad9f6191639af8b0c935f0dc45b31b3b0a1ef28b566e4944aa5f9e852951d1d4217539ae6c58b862ea5a5449e84708cb6825c50d57ba40e427d1e7667cd49e5631e6eb13a5b44340ef151ab3aacdb555fe6f65e92dcb10e8492fbe7e353102e9e0e2f8fc9b3d880af6503338036c (encrypted)
Stealth Address
a2b9cf9ccc0bc5ccddf49f2fedc2398789d56cbe3032b759914d3e51d8589111
Commitment
342b62d56c22da014888051279d1e1a79fb17c61ffc7e02d7b5ca5c3b932594f
Range Proof
672 bytes (Bulletproof)
Memo
a87706aa1478e3b8d442a3081524d3ab86a5ffdcc1a6f8379cf061d813422dc57cc546c86193f7e6a3783b37e765f65f77f4303f0402646796e12e6f7bc16e94291f99e63b5feabd35182af27f11d302246dc3bebc9417d780fe0c2d69a1fc032a9024b19ac181aceea731babc3d4b1afc8172437ba32e0513a371e655c71e3a (encrypted)