# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eacd9dd801da07487c1806a3d4caca12cbc2e3c0fa273af3ba4f2ca1e2877746
Pseudo Output
0226948295d1fed3fab7bf77768caed0ca364eaafd6163f83463ac1328ba7111
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3aa2cf0bf8cc67d369476a66d24a83c91dd5213cd669deb08e93da0aec49257f
Commitment
06c5ec38d9d783eb557b0c2c33bf7bef3bbb9d7c345378c396c46fc30b5ebb32
Range Proof
672 bytes (Bulletproof)
Memo
d25ef658c8f7c2914a2be73a3f4e43e6c297ac67d1d00e5d6772848b6d8fbeac6b2a95092248596ff3dfb439e99580df56c574bc264206dac75af07c4da52c0527335288943879cf3953f478824675a95d6099f247fa0fb8adb3a4ad83daf9ae6d473e603819d5c45430206b2d1ecee7afa653a9dd01d57c3fe98621d03f2f67 (encrypted)
Stealth Address
4279077bd2915e638ec2d9db733cdb184e9fd245a0b4f060239cfd454c13b10b
Commitment
380d1d71cde6ccd5c2d60468943e948d542eaa7b69e609078fbc7533b30f556e
Range Proof
672 bytes (Bulletproof)
Memo
73b3563be65f21ac2398e0514dbed49410ebc94265c48b5d661f06c591894500652a28c60d53bd730a242bd5d9679bbbbbdf4008e6eea78380eca98e0c92e5978d76f6cac67d16ac997ec5d4a12aa4e709ab0b4236bf7a056b53e906a4995081414419418f2ea1047d735f3e8d669589d0cae651694f7090054fe879397b58bd (encrypted)
Stealth Address
e6d9cea14f4f6e856eea467df124c91a46d91822810e89c1fbac27b233fd0a33
Commitment
ee157398cd8acb02fe43b185dde367d64f08d390a589573e09e3596ca9fbce07
Range Proof
672 bytes (Bulletproof)
Memo
4b6dd9bcc61cb4a3e27660f2f490f34ea808d3ef14e6fdd82cea927fe4569f6b60f9677101df12142038a027f9671f9d31247f338744e96ecea789c1ab6adf296feddfc2a6b8fd37548ee2dfeea22031f1212ccdc7d7ce2b5b51eca7f3aa63e8084d0077526c3dc3fdbbfe49738ba9498a56f832073dd68d8a76a1584d490c80 (encrypted)