# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
de03b08e9f9f0c846eed20950a64341fe539a76f9122625b406db12628d89341
Pseudo Output
345752bfbcb0dac504d14081842565c0cb50adcb1fdfdb89a3291c74a427f522
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a28270cf0553645cbcd2610120d0b70722156ce17afde2a3e2e3c1453bf2e31d
Commitment
ba680c575eb7e026a4cf89927ba8fe1cce46335889075e89c7b35a2f26450d3d
Range Proof
672 bytes (Bulletproof)
Memo
dc0ddccbdc8cf2df74e8b2b35cc87896fd0f625d9938c2505deb648e267cc1d1aaf16c29c126518142534f98d1ac6a55bb29e46640826c79ab3167d0f6812d5b9d49d34d9e944b29443f2affe8901b8380890511b370d7e3f1148c90216293af7a40e98050ac1d32ab9d997987586aea1458a5a29a23ad5b622b81434583db4b (encrypted)
Stealth Address
7089238f5fbc0fcd268b51edc6c35d2b644696892899bea584a5ff5a32299379
Commitment
14387a8fa6c332bcc4f1b2f4bcd34f7e9102a85d0bebca9162baedfeecf9e268
Range Proof
672 bytes (Bulletproof)
Memo
a88bf02497ca332247c3e75a61513ab534843182204fd1c72500b25601319c2698cf97eaf0910d80d5f3eb92ee1a7c7b45d65c8036bbf7c284e3185fa5c3041b1c577a35e4e8bf40f5b52416cb6dfaf036132ea5a9e5636558c4d4f73dbea3f510f6a759e5cc6f4ed615256742d6fd289944f1e1d43d9bc95034989b185ebdce (encrypted)
Stealth Address
9e68146ed338c20b80780bdb8e5652e23c872b0a4751ea484dab58a79c8c0c4b
Commitment
0279085f2631aa7b5879dd53e1ac868c54cd733127b3e93a79b96439757ca316
Range Proof
672 bytes (Bulletproof)
Memo
be2f160a4b6a84245c2a5a10d755418b32863d81003c3ee00a6b6670636a78640ba81d55dbaa34722458f74763850767eac607b6c69e57bdc26297c4f0d8c2530d6fc629527c4f4d3e6cd151388c122880e791466faf657fa890fc007459533796b88a13e152428195a2f3f02c7938f9109a3ec8be12bece743e02c38788300a (encrypted)