# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2ede65dda486504d948621272dafdb1ad3a1a0ec5aebeff8e670ef53a0f4c229
Pseudo Output
1046e85505c22c284dc3fc8e71b837d50d19017735bc13001248a4360f55725d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6ab94eb78644a1c2e72453dbdbb6c40e0a6589085ba287ec75008ef5609ad36
Commitment
02a7218c864728b3e85c1cf40fc86e6e62f69af5972ba078c8edff31e0fac538
Range Proof
672 bytes (Bulletproof)
Memo
e83db93728a4961f98987145d9ad9ce185059e019021456cd94560ede057a2184c9f0041e32803658231b66685e8f02c5e0bdac265334ab45787859d690bce3782280c12306261b6af17fa50e83aa0051a0438eb1ae2cfef1bf7e4b5a243374e2aa18f0e17d64fe2135c29995eaeb98604ef3bf6b3fcb684293f25734ee72ae8 (encrypted)
Stealth Address
72985fc0bf5357eaa3172411101a6f1691c8f34deddd9564c71aba73c093433c
Commitment
e45c82fb7449c6d21676e6f8228de062a304238c171d1805b991676da48af511
Range Proof
672 bytes (Bulletproof)
Memo
cccadce6616cdf7f88072cafbadf67ae08614587b5683843bd9c86e205a084a0471a3afb09c489afe58fb29292efb02da3e0164465ebc5a53500663460831e8da4b4e025a7e82da61dd96c9845904c1e314edc589299cd71a8ae670c8294c952d20a613947c44755ec9729ab3c791533870f20340a1574412ce4bf0ca1f7efb6 (encrypted)
Stealth Address
5051e0781b0a2b0fc0ce9b48e8712826166cb3ca599fb7b84906cb5890c1f624
Commitment
92d644520541e49beca18e3d38ec2cda71113406d8bd01bef8c94a407e39cf1c
Range Proof
672 bytes (Bulletproof)
Memo
15eac7ad4fa1389c2cfee316d10ef5d82336a4c5aee5b76fba1513769b7b0c1129fa570127f5a9d66c0383d3d64517232b5e8740a3b0709e2ccd68a0566011b209ffb2c26f4a12cb0bd5ad86bf4003194b7fed12197f4be2f5ae7688b28d2b0f828ea59e529f87498a38c7595d6126418ef31091fbf9607ba283f9d7b9324876 (encrypted)