# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aadc02e1de6a3b1bbf51b4688e6a57cee17561f3dacc7f52151ac7e703adc754
Pseudo Output
5497b3854a0e12c83287009f7338aeec1ed5ac7f974a850241a5c66e3ad3c20c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4cc37810e9d0b3c769335a710b2e5037fd979e1138413f559010b735e15f0e69
Commitment
32053251cb88c978a736a90d5867fef6b55310fe6f5c498dd495e5b7b29a3319
Range Proof
672 bytes (Bulletproof)
Memo
c934767e10d9c045de63867d4da05365ca798193ff1eab5d56c22d7f52716621425f887389c09acb250e91edc17b78553331a74abb02d4355b6dca5d80a5658d18dbb7b0ccfd4a5e9c1ae98d79faeee0ab8876e8a6396bcf947d4e00789a656d6dc0c4a5304aff4e9b0ffc08461354936b6414d5e0d052929203d57823f06fde (encrypted)
Stealth Address
0ac0f4e84c982a368ec52834fae2cbb6f11e7651fff7c7deb286425923044b77
Commitment
3e0c56e64bdcf8dc905ddc76270ea05473f7c9b2547a768d413e8c5e30769c28
Range Proof
672 bytes (Bulletproof)
Memo
19501305766cada9603c36df3101eea954d48284210e091dc10b65f4be4b4f3f7e4e6e579dd666f370569124470a0f9138091d17c053425bd911856424334afb829d25fb6e1e285e5b5345bac9db737df1b5d444f729585c078a8a74ecff9e806a72152c9291d74facb25659f47b27aece53b7c8a57adbb2cdc10587d24bca24 (encrypted)
Stealth Address
5afd6ddfb079f55ae5faa25e3ed7cd012b4ccfa250ef24a99092ddb5f9f31a76
Commitment
0a2252c832f0d749817f5d58c33192346a4d225819283544c760b2874e6d460c
Range Proof
672 bytes (Bulletproof)
Memo
1a4ef69a3b2063279cedd5a5e2286976bb2b6c8eeca18585f5066d7e41f7be3843fae1b5a69ef47544c4e6c059fbac41ac5fa2363c43148f60541dff314e93487acd88850f041fc90559d06408b097e25ad50cdfacf02adaf40d1a1f85a084b096609cad617d84a24c4dfefd48846d36bf1e890e1fd37ab45298444974218dc7 (encrypted)