# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
06f8be3475d97eaeb70c89eccd642d6d0e72abcaa925d35ab2815e0913a0d477
Pseudo Output
20ee3f62c66f2b86aaa9634df2f5573ed7bda09d65ef6d09e219bcafb5a82624
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8bebdec9ba3ab64949d14fa5d4d284d5346f379fc878424b617f55432ccfd2d
Commitment
202640421024cf86840b5465f3a9636e7db0e36cf5d47ae6268aaca890c9df0b
Range Proof
672 bytes (Bulletproof)
Memo
21eb91d4fb40480686356f072e67637c3900cf88b3721cf6a99b0f8e05b50a0ef1740b03813b4d0b42be0cd2431a91ec2862c3ced79d21a3a577b0e326be6c5e727350d322efa8f4805536738753f7ac8edb2a8c3aad07388cc46b19d0eb4fd1813dd728425c59db96d2e80ff324317c0c5b25cc6216a97fe8c6475414143290 (encrypted)
Stealth Address
140d8c699ea702be3847deb835d2735df97f96da096c72401ef21a426ac5bb37
Commitment
444670e402c247a35371540258151094637b3ebb062494aacf52261c491fcd21
Range Proof
672 bytes (Bulletproof)
Memo
153601abad201baf84dad42ab6f2e8ea392563896147bf275cfde5d4f08f03606bad1436f05371ebc108880584029c814c8a3e713575c5a3ac77f935c4bd5c316d74197f19eb20184398e5a27abeb2dba5875477a2a967004432758cb1af9f2b0651e9b8400738c96d1428ce9aede7dc133d91c362eca771ac5475b0ba879a79 (encrypted)
Stealth Address
f8fa931a3e1aed102d722a0a81fb844d2a836398b8f613887be168bac2179902
Commitment
4e6313e2a5424004b5889c6f80af0b3fe6211c80d94728619cfe2bb868ac8a56
Range Proof
672 bytes (Bulletproof)
Memo
cbd35eb1c4e8a38a80afa1de1af3a9f597fd4b2588e209fa7401843632ed477ef50082836f429c010470bcd02e1e5b435eb039b228c8cde3826d88311e787253d9c1f7958f0efc277b20f0f96bfb279a01d164e30c1f472b65eb1c0684bcf199d8e76ae97937bd2a27063b386def1deefeb29585e42471014d9ddbeb6354b3ae (encrypted)