# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0068f38876c47a920399b9dc76a6e18c6993eddcb857a2691920df5a1e2cb24e
Pseudo Output
485f3903b467ca2e8ad58c8f106b4fb0bb0dc1b8bd60927e3cdac12fcc5a6430
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a62450f12a550ac98b29e1500fe253e3350ad41f592d7f143bd4eebebe4d345b
Commitment
0afd817e6ab6a084164fcadd755c089723665bd350e97397925dd06a6f7d8e7e
Range Proof
672 bytes (Bulletproof)
Memo
c9e66285370cc055a0bb0294f75e1af71f9ef953672352fa11e556bfb402f09b4b5b6154eda8b50e443a98414364ecd2dcca7c997e9e8c1f4ff7bde58eeb425e74980b72acc4c76f8eb5cd13c9c08fc28a8a49c51b8d0ded0678c7546a483d873acdb6d1e0d79910b766ef837eb9e799cd1c9dcf0bad9c89c8c62f521fa26d2d (encrypted)
Stealth Address
ecfd7b8e7df32233c3122c89288f92ef4c36437e9e69f6a312e18a1ab5cd9125
Commitment
4c13df2f09920770d14039340958c183d63945a3d9e2ece6320e41d909466a0d
Range Proof
672 bytes (Bulletproof)
Memo
056ba4530a201881f3b925b8906a1bb164e9656bcc1cdc1862420c78d5b83332ce5d1d768f9ab91000145e43dd27d9e5b542bbdbff0f51107e957bcb2303c4c6649fd14788e7119ed4c0645d5acf7c1a257d9b72df3f48a8486acf1c312edea85684d045dd25164ebd51ff23cec9f1ead02478174ef6d9c05d750ee2570762ad (encrypted)
Stealth Address
e6999e59d4b2adb7b995d3ebdec65de178666d04f5a42b6a43a704d23a9cd935
Commitment
b64758048fb5457bbef235ae321a158c8776f1dd3cb53fe75034ddf1171be060
Range Proof
672 bytes (Bulletproof)
Memo
efb42654eb1749baa7609461d355222f0f5d0d6d1454c5aaa5b1379110ea7c99df39c7a230aa4f3fd05d9a256cf26597bc956cbd5ce890f3eacc3401ad391694b5b61cf074c8e682a8265a9704bd151b4d88a91d18719cf4b0e281f94c35d80757392c71ad6e72ebd63d66ba4ca4abec28b0ef8436d2f2e9cee766ec524ed51a (encrypted)