# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2a974668ac4c60179f3484846f72fc2e16816e33e4634728ab4bb9453801bb16
Pseudo Output
0282fc2b6ad9736cc512fef9497b61b6d7e8fcaa3245ba5bb217b0ac05f47457
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8d0decb81d60bedd8095a6d775620154abbca8026a4381a5574acac13569b5c
Commitment
36fb8acf48e97066be430beba30833a5ae9514927212ecb307d5a44d8eb03f5c
Range Proof
672 bytes (Bulletproof)
Memo
6ef2157e8ef84ab17177b8a3e5ea4e63f6f385126037e1c95e5722e10a1df88bfbfded503fd48a11d738bb9ac3c034b43a31bfb519e51725d664e9d082a3729230955a2f9e72b213e475789f67fd1e83985a8ae2b1df522188e67ff1d69c86b3fa93f03632469d5149b9943e296b3c4b6517ed32b5884b8bd33a9307e24bec35 (encrypted)
Stealth Address
0a065b53c9874a8d70fe07cf035709383b00e6c6584ffe78a407d339d708d613
Commitment
aa1da8d36baa4ae2ea78a549c5cb607210b1963fd9e3fe95430ca569dcc2dd77
Range Proof
672 bytes (Bulletproof)
Memo
90e9412738f99fc7398ff7291325cfddc10cd96a3599b1db8749ecc3528333e5ff803cad8f945589ac4a9f0dce78fec23579c6ebcac26853c90a5f9674c5f165d9abff1f07410547c9af4290e140721d52c270de429fa69442637ce36247f2171cbc285f8405136966113b1876e09c8ddca2df8074eb5da1317d5e2471de864a (encrypted)
Stealth Address
7c19f89b27570fe557f8f2d9a80400c8dfb3cbec8aa2a3bcda58de44c4161565
Commitment
f681d96f09b64ee83b0faba592f4308a53c78e2a434af0417855769c68e60d48
Range Proof
672 bytes (Bulletproof)
Memo
9adf348b6a673197591e7246ab99ae05dc09428347703d02a5e39dab8d1c5be4d4595ec8f166523db23993642d46761588ac4b2da25c54654a383cc83daaff9ba7dcabed2324bf5f35301e5874764b5c298e358d85eba33d6eece94dd6d26a471292bbec4cd3e6f16581e3ba7ca9407534b63d47bdd9a1743fc4c80292007de3 (encrypted)