# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1aa3da9a91e84f777ee908dd7129d5e7e57fa94f2886d7cdd298902d80d07962
Pseudo Output
3079163065880a272463755261158293f730bfc6ace3583103af50ddba143e66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2abd4d61ae4ca4bac1f5b7a19eff84bf22f5e97e55989764d6d5817e7d43d22b
Commitment
3e256143bbefd63583e447c1deeef246369b5d93eeb95a305295d2abecf06816
Range Proof
672 bytes (Bulletproof)
Memo
9e12fee6c5f55e7c3acc65056b5e357462f8e1a5a2d76b727adb86c27298012b2a77be734f722190575647bb9b9bffc550f38d3dbb2d52b0fd7ea96fc103df9fbc2debf8c67cfae72a6e111f77b19a02f11b4477a9591c1e27a50252515cdb7675214d8bdb31ce3872ba41e8c315dcc3588c924808105575a1c337494224e26e (encrypted)
Stealth Address
a2167d0887b471d87c9a6fe7df579d2fd55922028de194399aa00d9fc1387256
Commitment
06de0ea6079ae39e5fe72652a3c429fc88df77ce3920cedfcccedf16eb367220
Range Proof
672 bytes (Bulletproof)
Memo
46513ee3158f014f59f9e2481110508d5f74c1841caab28519dc7fbac424be20a6e8ada6836534dcc2dcd15c191b67a8f01636f32337077fda23219180298b5777d8d3e9061b17df47a7c13b0f508eabaa379691879e9dfe8dcaf784b7e03bfec908483bcc7ad7414e9f7428bbd027956812da195d97328644bbe3f961024e6c (encrypted)
Stealth Address
aa714237dbef13585f5554a876f6780866c5f40ed981ca1e4f67e37a7d6eae7c
Commitment
b81f04082a3567f1fae8c2881a897385e327a4b8c205bb3bba2f9275f7fa973d
Range Proof
672 bytes (Bulletproof)
Memo
3c708706b906f066babf5d0dafc3f501c9ba7e14634c7f7d01edd5d613a8958bc3d8c67e90fb46c2ced1cb79679892f182c0ac99ec593aaa548411ea66ed5221046875bb640c533cb9b92bce826e479cbc5833cdbd897e8c89dd0f6ae4f1e1eda43cfdea8106a9dd0a1a8998e0806df15d041ec1ea2274043498e698985c673d (encrypted)