# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fed82318621da2024e0fe5bde064aa4d2c67cf31410d8858856297fce0067c7c
Pseudo Output
3895ccc580a6d6f910c82a0268977327abd56fb06b8ff78fd0e77fe8d7c63e61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1291ac53bbeb0ec51ec028a70fd6a275f20b773b3fbd192de02747050beefe7f
Commitment
7c014ba9fcf2f2e153368f41b4138b98741d485abff9188dc56c207b6dcd1d4d
Range Proof
672 bytes (Bulletproof)
Memo
eec40341d3c73652ed8906f957728555a6f3c1a3348e8c14d670473ef4e60f60ed255a01e889cdb6ccf0733de1c6e2ecaf4c661a239617553757b0b1f6334ae99104c78c23b13147a09623142d09b7a47fb182506263284159e74f19851e48c95eb63c691df7bddd5a27bf3e909f6e9ed8c29b2a2ea3b4da9f4067c243a0f402 (encrypted)
Stealth Address
08c3965cebe15f72890a4b4fb29187404e812376f4bf40f7af8d04f87137011c
Commitment
eafa8fd767ad52fb9d2dc87d47c811fdd84e6fbd363c23aef919f9d0a2ec1235
Range Proof
672 bytes (Bulletproof)
Memo
718014b62e9a8e851455b9c6e2d3f11f338b5c5cd89e55b56c1ef762521cebe81f477bf445c9130c996be6c33047f691ea3a5a1c03d5acca4979772dcb39ea249d76c1f18de6f670767c65d0abb24d78dd35f501ed931eb92cbcfa1b5897158730cc5ed7e5871f5f350e2345f99b8ec077cebcbdb4490a86839aed5708d3c525 (encrypted)
Stealth Address
9a40bc2dd9bd28aac172061b698a81e65376252c4badcda79c119fdd282fd664
Commitment
1ea020f31573bdaf3d9b90406505513b5c771c4073fcbc0b9d87b2a655be2f22
Range Proof
672 bytes (Bulletproof)
Memo
ecb427dbd8efa0a447bd68a439bf5c021d01cdf0d3873964781e8ef72849dd703d3d31de6eca3b9754cea5f26e4a3630a347420bbc35faa3574882f25dbbbdbcfc96645ff079b646c59d0f33d6341aec825538e8308c824d61e8e800378340c2e372de24c44abb2b3a2562f1742ab42930d9a94d2a342f855d3e4695a73c2692 (encrypted)