# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
143bb5889e54d3f2e827db6af2daf4901c3130376f0634b910705a3ec4935634
Pseudo Output
8e6dce06142e486ca93b56f19409f15b4e4ccc2b4ba802283df1aa528a6f4016
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
00ad49b352f4e4df1b54a00c164f2fba6698b79a35148863948025acc250dc3b
Commitment
08cc923c32334370d0ede00b34dbbab99046b1ccff21a4610d0fb0a926a9817e
Range Proof
672 bytes (Bulletproof)
Memo
31a143561fbb96b0e63af72cd95a0e64406e26092b965fe0e87b097c0578b4171f7fdfef363eef9c5419ea57bafffd8c61d9ec32be3e043029384f24735a25be8ff90c060ad07af3dc77d8a1379b202787a45ba64b8ada6032f466d811b2781953d0e0fa3e8fd8be7671ea1d3d36b5641b871d50fd85d78dfcf38ecad16e1c12 (encrypted)
Stealth Address
ca9e055b1717057f41b5b96c4972d969ace9185f2eef04b0bf7be364b6a8a701
Commitment
128602535434c32d3f6af1e9f34cc15af7b10fda693f33a6263ff2a6c6864f79
Range Proof
672 bytes (Bulletproof)
Memo
4acf0d100a17c56c8f6c04666f540c901fea925259f557773dae3b7844a328f48b96b6e207a03cd69b8be2ab14817ba8006a868213879c8c71fee1c8a2903ea0cd129b98ee01c491f4e1096e8bcf6f97420406e68d57cf308de860a5843df5f5dbed430d1a26c94ff8ea6b2db984a523dcc466f6c225683db0483fb5d9856864 (encrypted)
Stealth Address
aca82d6b53f7bb4e3f4f659d2188fcf08a88096a49abd5b128fe685c8d4be627
Commitment
02e400687153385a65a69cf5e32079e9f4279a9f3d9e14b940325fcaf43ae27b
Range Proof
672 bytes (Bulletproof)
Memo
effa4160fdf7dd468c19cfa0028377123ca72009e4c6b669923a0cc093326a34dd56d3c30f38e3c4814ec6e7e4b1613a51137eb806e02840092ae7106617b428602a2f26efc45faf32b13e864b21d9ac6736c7af7d625f772c5859027f769dce252d1bca956c40d0c0f382e4f1d116942bb8cb7ea7052a58ce2a3b6cabeb1b5c (encrypted)