# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a2512c419e6229314b225d7c9727324bb3ce32816a506487e3b00f05554f543c
Pseudo Output
1a41cdd71b4f414d532bf3d2f4955de5f47491363a85f99848807ee8f90d7374
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bae438c78e89df19ec0d5d84b4bff9fc627a8695385cf4a85697a4838831c031
Commitment
3eceec8c7386fd8746ccf0dc31f359f7f7fde2019283b42b226474d085a0f16d
Range Proof
672 bytes (Bulletproof)
Memo
81fb6c86fa3b93da5acf0217097fc6681ae284fe1c1952d20f482bdcdf1cce4fc685fbaca792561db2fb5e535ecb315c0f00d7217c51d0024a3bf2c7e58cf850e561b272b2859f1cebf294295de9bed4fe83044f2929ce9b226b2ce0f1495674b222a403886a5af29889691686f9ae00d4fe8c08e1209d05a4085f3c2a54a049 (encrypted)
Stealth Address
6cf86b8fe7b9df815623ac7b709f3d375590194621eebaeafa8c9b6b8d151d6a
Commitment
b69f1bcf4f62e37fa0d87d459231c719e03dd0e04181209fe87a9ac1b9f10a0e
Range Proof
672 bytes (Bulletproof)
Memo
e17b7eb057a75ccd9db9bd2fafa63415257b2168cbf48c4c350e9697d0365f782746b265c4229d7a332f0ce1e86e5851e12848a9c233ed0acf8cb9e55af08aed28f0b480e681710e7a9136c8711b14b14ce11b6ad80523d65d4b5dd93708486bbaf617afb95ad71acc23e81aa443845162952256ac9b9094bfdfce81fbe6cb51 (encrypted)
Stealth Address
fc4fc831a1ae19fecc1714d6ba9ebc45e053f5369ea833f692fe50005d57ee3c
Commitment
04fe09e031a74abdead080940af12dc7500e96118ce7bad8c57995680d93b272
Range Proof
672 bytes (Bulletproof)
Memo
07a702d71d5ef0937d81ee72d5c43aac3f467743bf93951469dc801ab3d58f5d4455f6959942e718eabc5ecc34f8b69f86f1c2c65eae60ff54600cbff1985c242fb0d652e411fcac1e43d6282f9722fe1759bc2b07150282f9febe02403ba42ebd33e2765625c1475ca7d66975407360ac176ab4a3d545d86fbbcb1aa2223885 (encrypted)