# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aca71e27589b852000afe34e367a77a895fa9302c987787da78b411a4e4dbb15
Pseudo Output
8c2d6e4e19158589d45e5db2f1e724ae75de72ef1c02e2fd1d2aaf29040f1847
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
544eebb89ec0bd96defdb1f5d1e32e66f26981bdc8fef203c681f749e3c8487e
Commitment
66d6606c77e477483e0ddc1932c64f02d24e60454b29f3dda35c39a595b7f321
Range Proof
672 bytes (Bulletproof)
Memo
24eb422dfa3bf42d5e8c70ade790d11d7e3011f741006c427cf3c5124abbfba964ec45e289d882cafb30df1c174bac7b0905a0257fd98a215247878fd4ac82fe9de64a50bc84a652b52396dae832a3ff5f0753e42930281b2476d6779272abf4430cdc682abd8f9587f8383f61528eb5c59e6fb586024f55666449cfdedbdb00 (encrypted)
Stealth Address
1abbff905d79b3b6f22b06d5791b0c54437eab2092ac86627b1ebb3fdd9fdc08
Commitment
ccfae7c66529654a6883c5edde495cdb12f56d01a2a22af80ad891a93cfa1818
Range Proof
672 bytes (Bulletproof)
Memo
5921b5a7e1c0aa7cac142a95ed737a25d1ec0c1470ff46a2447304da777ba5c4da873dd06776ec6c97584c092f50f734a98b931f2fb6ead0695a22da8a8313bc708445ab70a74955e32e99cff6a8118df83ef0c150fed8b9db42964c783b7f18c24421abc8822028eefdb1caafa735fa53026faee619685f347753c143d15521 (encrypted)
Stealth Address
2e2cdcd9b48dcd9dec582c0896755ae1205b9c9fc509e619cc0360f91df62f2a
Commitment
c0a5fe1bd540f64052c8b265f17f9197530154d896ba5d84e296a59a72bca174
Range Proof
672 bytes (Bulletproof)
Memo
141253515b7cec73f7696e44c3cf7d913d6e82d82d9bf42433611c192e148233333d0c4565a7e72e89ecba88883dd19c6f338179f61fc7dfee17685c7333dce250479f6a15dc7d3c365a88c8f3ba968a2163e931760b9bf08d83c71176eb25c1d445f18bca946e586bae19231974913b983d847a2d54b924b818b61e29a15c9f (encrypted)