# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0ff3e3a1c02f51d326f07eb5c5af7658d2b7af836c4537467af3aacc944b458
Pseudo Output
c276a7a8794fe172421cdce95331b24524db2c29fb4badf5756cd92106442147
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6a7ca7f972117ef1af625e46f39bce43ce1fb579018c6af12a201f8d61e8a46b
Commitment
22238bdf8c09d5dc3422cbef289d8b153eb9c51cc17a75c73af28efee7016468
Range Proof
672 bytes (Bulletproof)
Memo
a5fa0941eb18bc51ec5ecaf788e1ad0d9237ec3e4ddb003320dd81905762596b1e143dcd1044b27c669c0b0bbdc372d3d71c90469a00da64e060d6a6cb5813ec369fecda55e5be28cd8b8dec851aeee4f205b7d2464f0f7289dc3e84fffe64cbfa018e3d1df0d190d12413b69417129fbaa4de275aa26959f7de9c966af4dcc2 (encrypted)
Stealth Address
fc247b04061bd508597e5bffab88690778606296cf433dcfd5457e30b7f07252
Commitment
ba33dbfe4200067f04fb1a1113e97c8b0e177f72aa8d5be57558f8a03e0b6517
Range Proof
672 bytes (Bulletproof)
Memo
d6b57733be06b35aca352650e4ee2590970bd774d516e9b1ef92c3554ba0bb9a5da05b7662d96e11145e44b48bd3ec8220087fae9bf80f667805000aa1801f3b6842e4262fdf308031b91352ce3fc1153d50602d53ea8a99ca249764393ffecee9e107433579aefda5597c99e71cbb3a8e755b6a4b224c28d1decdbca4eb54e1 (encrypted)
Stealth Address
e6aba7c6728c480e85c53a2011d2899318bc6980a6d92cd06cd3e7c0fa961a0c
Commitment
c0cf5a62d3a7c81d324ee48f5c2d823d4d13fd36fcac92856cf8a96016eb9b68
Range Proof
672 bytes (Bulletproof)
Memo
466fba95bd769ed2f1b4be6865e54f389490d6e6909e973a662606b287fb86c49d65b3259af733c8f7ef0c4e71eec994a3f8cfb7ead500bfe00125cc700be7881dac5e216daad372364bd7f343a155fb49ee09339285df1547f963f52df6618316e3abb3554359c046e854ee068cabb9cce0798bf289b689e4af5b0c4fa049a5 (encrypted)