# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa56fb41e5ee3ae9d95d1f1c047d387f482b76dcad27cbb41442291caaba0c35
Pseudo Output
96a4273802786b35ca7f3aa9821c235e5f6f11e3a80299e3a591b377a358e40d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aee8e6166f782edb565db56038c4fde16157059bdfe748bb632f4f897381e43d
Commitment
4c5d7551166d332095fc7d0871c38d88993feb0e53337379b2e71b09d73c851a
Range Proof
672 bytes (Bulletproof)
Memo
6609c2babea8aab196d6bc3f92e6cde00d861a3ac4b73db894b101f9015fbb7bea41e9abf6efaf9577e9cd9fa5de7833222e3ba437d158f8f36a85e60f66804505afe4c39864b7bac78b8770357076350e7c174e2a6a684d3fc3c0cd454f56976d3696697369681728d79ca060be6a8bc75567ce8cfc54a3f25ac9c8816afcd8 (encrypted)
Stealth Address
ca9a926eefedd6bdd6b03bee5e4bc7417cd639efe4ad50a5f07509e3b07d176e
Commitment
e82da488fcea2f7125c88031024dc1c451a701812ea5ab2090c7f9b30793073f
Range Proof
672 bytes (Bulletproof)
Memo
5e01be4941c54984fb9a697d7f759b653e0cb8cd262181f5219bf229e308841703d2b86e677f3ae123fb273a0c2d34178c450849202c3febc24e8c7cd8ed07824ccdae5f9fc45ea98a5a4585576b80b1cb598c7bf65d6f1dcbcb014853cf2c7f8cd8b75a0827cb433acf57a0b5ee45091304a72e0eff327d5ff8316697e916b5 (encrypted)
Stealth Address
1856781ec819ca1e708210d80a1835e7086e5adab9c124aced97c897ddbfa453
Commitment
22df96e9f214bedd9eaf39b2d06355c7a2ff4a016b7b4261f159ef36b9b6cc1e
Range Proof
672 bytes (Bulletproof)
Memo
55db33e81ddd64f41d91c1772e0263ba54c86c7896993c02591b4d4e7b1b18acc0b90be631c9c19080cdd580724bce01952f739d75eabe621f561bd679cf55f4288303843acc85d850d5e3918e6717ed5b3baae02b7cf57f8d2c7661b5fdf73e5e3fa5c7d7f089af39bb2298ed298cf4c3f9387ae6ef4cbdaf97bdae326f4969 (encrypted)