# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f2a5a21958e1c621761ee8ff24c27dd45a59bd26baf8447f80865c7f16bb2270
Pseudo Output
9a274950db7d0493bb4036afef20bf14881f6c3139c4fb738a9dc68208d99547
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ac4f33d1991e777a232ff43851f23bd5e814e97c16affa716bceca7b09a2314d
Commitment
24b986ebbc0c8e3bfc01b2cf641b2ddf3a7fa8a1df6bb749fbcd6cac4c51c758
Range Proof
672 bytes (Bulletproof)
Memo
f8635110411f07e8d5cf28ea02529ded62e9ec4555240b6dd57d33d856b507e769d8d3de3b559c213e6f11133cebe82098152ac50cd22264302f8f8ad5f0608faa6c968f9aa4939d1da2058bceced40543dcab9d82a48692486636e1c04382c13a58b2285284ccb9390f52b5671ab550337f49368ad5c043d284893ae1d41fe4 (encrypted)
Stealth Address
3024bc22e55dace145b768a1ada9cbc204ba164db27a812a0ed7776d12a6677c
Commitment
48fce7c481958846860d8bade55ba5327adfc0944118236aa631e49be9425b21
Range Proof
672 bytes (Bulletproof)
Memo
077d9f183cca3f11531a4b40a73e844a52e84bc2b341eb85dcfdebec33f5f3c95619a623b044d1e76b89c3398127f56c7659b3d55449e6f7a74cb4b68b65edb80f9a09579f98e2391009b46f31dcf688fb6c43f51c3ce73546ab3587f6b68dd7f0c69791d5ce6cadb8b66eabbbe4e9c6ae9ddef984a7ad8275aee443a4b018ab (encrypted)
Stealth Address
b6fb47915ea6d5cd6042079b93e9fe72034ae0c80959f3ab1dffcc219a16595e
Commitment
a0d6b6092a696084f49a8e623788e3742a12241685a67c024e2a990b89a28e61
Range Proof
672 bytes (Bulletproof)
Memo
96f8acba663ae852e0dc9d08d6aebb8e2364e9b8fb8aa99a39fa3e0816cbfa4c8fd8e1838a95d7810c37fb80cb3971ac05f408018022e5fa3c3442cb3eacf47d8bf7be97c606b79145c6c73cff0b04c9b33fc822ace5cefc10e81704ffbb6bc50a68ed6c4fe99236a7cc16b6933eb3b125d8db65ae20d5a01f9cd89365d49fef (encrypted)