# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7692dfba4f56fb87a57e239b759f5e875ef5f5e047eb2da30735ac6bad9e7552
Pseudo Output
fc5dd8856a43a605a676eff97ee0ce5a820e0097a67cbfcf4202ebe38c75621a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
486aa605ef375205e674be9d6a055d682b2d26ae9e0badc98ef9d67db004ac5e
Commitment
846a42845fc2bf00201f88f0993e6c0b932d36e56e03735657ee9589f83b241b
Range Proof
672 bytes (Bulletproof)
Memo
fdaa05f436cf95f241f13155b6fe319bd922f30a7ebcd08a5ec1c57e869a7fa4e563ee51a8489b4cf3af310848db3e73ea26e19728710d803ced6b259073aac65c6a4f9011b333a858a4785257668a26d6574554c40d48238405364017b2efdfc474fec9b5dc7aba9abcdc54d2b3955e45361959a124f6ecf3cc4c8b68fed540 (encrypted)
Stealth Address
cc331523592b9886ee754610acd101de6071b3ffec89eab07c8a582eb88b7035
Commitment
d0f553ace4b90a88b919a3744ad40d7bb9c8388e986f0392a3efed7668bb0c26
Range Proof
672 bytes (Bulletproof)
Memo
28c17288d1760ba1dedb6a7497ed7cd21ac4f5018cbebd0e63fb59ccd851c0c734b7e697bfa81e0db772c47c5af3c4832e968b60e97767f6a264f5fde5284a2147d9030956825349419daa6cf12fc6c5df73990609d5d7f473db5ad83d0d0046b09fe67b8a550291abb102d388f03fb2bb8e5fed603511a79f5e9872367d1d92 (encrypted)
Stealth Address
466b9556bdb408392057eabf294c0a7c45a6ff5646e12ebaf3c156eed9defe2b
Commitment
0ae8f35e026f207442a90c1ec28dd2bd38b1f3f00de0a5b608683ae097aa300e
Range Proof
672 bytes (Bulletproof)
Memo
e2dc0d0c76208984d83e37a5d1dde27943bdbdc8b7d830d8801307e62e36b5d60d6207ed424b19d01167454c4352b4c86623cb3217955f2906144406aa2f299a6e1a109871bc45063cdce5efb1639b11c17d4a917713ae1d5b8e7918594687088cc5877579f06a230343bc25ec4d9bfa9984543e19bb3a2f49735adcb85d6d29 (encrypted)