# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8a92bdd2bb1f166c011b9eb93c916b4d2ce6ce1ebd59db47eefbdce1cda4d217
Pseudo Output
24a9abc4319a26c4adda874c0674ff2f44b2e873924d9ebc172e1a56c70c4447
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5483cda11b011d925ae08bc92838d169dce27b9f1f0da6f4dd22325cf134fe4e
Commitment
64cf6f0980daeb3975213fa7b7829a8915671aff0fae023f052f9bd07e8db063
Range Proof
672 bytes (Bulletproof)
Memo
c96cb999545111f05f4a6dc4c14c4856d07c5a9bdd976504fed3d00922d8e1fdf746ae93301d6986a49884afa548c6a579fdebc7d5e407a8f357abc613ac3c994255911d977f51dba434427aacad178ae29a285781361901682f6b95a84b87a59ed2a8a9d0ebbec329e1e3e629aedb26b0a7ae76e9d650bf99fab714942d8a9b (encrypted)
Stealth Address
1871be8776f7d374cddd4d14d7549f03bf7c1cc7f090eed2eac8405322b9c37a
Commitment
e052389a3754205d81c4d5a97bccd6161ee3cf67dcd9105343385884105c1156
Range Proof
672 bytes (Bulletproof)
Memo
50d77421fff46f9cae7be037647e391cb7789bedfde4b74b9b05e2a3d591a0cb20495cc98a404d18036edb9c3ab66df76b5968cdca57dfd7d1891002b9b77d33273622e0be572668bc8aa372d809df57d3b0b3e0e86571eafb703142f4cd7944ac8cccc2d9738840ec7c4661a01e78a9b07f3ccca96f115549f9051c833b16cf (encrypted)
Stealth Address
3c86198a8b66311624c628884737bc8111624a17984a4ab523b61dae97dfa009
Commitment
68819585c10f7ac1c3b2453ec51fbe555dba3848f4c8209d7be7c560ac6d3d26
Range Proof
672 bytes (Bulletproof)
Memo
86272dac8583d529bf58d700eab5cf966afbf275e2c79a07abcaa8287514b5a45f243f77873b90b420a1b9c33984ba776f6927d7bd9ba5a0f55e1ff23e2ffdf541a07636261276a01a714a2cf0cfbe8a93f564b08141de3db863002e0bf1853cd1e8ea7e0b758f7dfa1c6a033386ad211b8098abac5776741f4156ef467151cd (encrypted)