# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c723753ba376fec43d3fbea0367876f2dcae1ccc9bb3cd6b264d56027cfec72
Pseudo Output
fa4e4e97c40905f87b2d00859a58ab4c6d21767d30456883df8d5f01b9115338
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
06902dbca93437147fe01c29a6c11b3e9673b0a856f69a397a714b9154d9c17e
Commitment
2cb93ec4190f5cc09b33ea4001a60c229af8b625551c139b83ce5b9a95b07201
Range Proof
672 bytes (Bulletproof)
Memo
5e8435c37c8b08b163a8a1cf46fc21896cbf7d1ba6033d4cb5d1d92366cb37fef51cb17d555eb79836d1844a27b5fffaa95123dce4c01552ddd25ca02bd09ae65f8e2d588fcbeb347546f9f2c9b161c53659a97851783e0b339c37455c1363acbb8b209bc829ad2ef5f55a8437d8febcb6ee79604fcc8eb553533cdc32bebe54 (encrypted)
Stealth Address
882553256f1f9debc6a3d30e57719cddab3e1efe6b822affa662ac934730f542
Commitment
00868d520f34d0f0fac4d7d7ae15366debee032c8f2c90806b4b8831d6912f4d
Range Proof
672 bytes (Bulletproof)
Memo
b5097776c2cb1a38b8544595a224cc7063a2ffeed5783436f6059e284380836b4871ca343d1e50c67d6dcbc223f5ccb1697d2cae2a98cfa9d6069b521d4ad30b17f124a9cfcfacdad47c9a6b4fa08e98bb319d86ff450463aa026f4d148c62b8bb7f07a2d5862c37b34e2c3aabc529f13ca3b22aaf64290a1aee157ceea39b06 (encrypted)
Stealth Address
78d8901119e80ffcb9b8fab61f5827f568c02eb4263955fa1ee5efc98763c904
Commitment
90a4e2caf9c0b34532ef50137c95186263cadb031845d834bd9911cfe1e22b65
Range Proof
672 bytes (Bulletproof)
Memo
afcf846c3ac992718b03ab03999fe6485bbaec5702c42a7f0c0c257f072b1ea47fe4739222a5c428d5eb597263d953a30e2cb12dd03f20897ae4153550f2b33c950648d18ec080130c0be5b4b093ce5df7716e9c88f1d7f43afd94c50155ae54511c8e678b8ddf879b5e9863f45274f4f863e7c5ef9a084d7ad38ade9609678a (encrypted)