# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea81eeabbfd157d93115020dce23221eae2aa47ebf36fb9580e04e0273f3db47
Pseudo Output
0ee05c0e6a702f1e98fbdd26937b1a429079b9a01629aa85c1cbec9fd1bb8b51
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
baaa2d66e11eb6e5259961270d50be8e3db84fe32f67a7f3800a8c351b845669
Commitment
4c2438134b59ec6dd1fd36d26de75a6c8325a16c5cb6704030961dade1a4bc6f
Range Proof
672 bytes (Bulletproof)
Memo
7fac9bd676582ec5125f34c2d58234f13d53af9fc623fbdc77e3d82152edc34b3495e5d35bcb4e2a91778f09a8cf54fef205ee76c3cd6f9032b08f456109f36752eabd023777d28933fbc38e2b4b8c9d63496dd67ea3e20e35979993a255d5e8dd180a3d21465636f144712d6f754fdf054d7cc9095bbc2009f89980767ea1a8 (encrypted)
Stealth Address
5ee8721dbf75499e21bb7b5ba289ceb44967488616ce6e5afe684722637bf12c
Commitment
686d7d149cd16b7bbf164433029b39cdd6e1a668c2bc0dadc8ef63bee9f28a14
Range Proof
672 bytes (Bulletproof)
Memo
07d684f7f6bc33b29595c6ca0fa3acfe17d8904d1fd014b48b86f0c56211e913a30227a77c218c0659de08b1125ec1eea711c7d498d6c2d0e7b807857de8ef2edca270a953bcc153d0dcc076edc88f18b87008c1756208bfa55afbb65e2ee0a43163b4f3ac97720e9ba2714334db11d79ac759e57ad789ab3e753fee3b2c0204 (encrypted)
Stealth Address
74079565009ed52a78db49fd40b362d42905eb12ae333873dc8529a71729f02b
Commitment
a02b2db95a947528d0495a7d9ff3b97555b145c402f501bcdbdb2e294d8d5e16
Range Proof
672 bytes (Bulletproof)
Memo
1db1bf00ff259afb233e3b0c8b79cac4480bd0cf66b87818bd1e9fed969ffdc40b84f50740adfa315666896fa3ac88d81907c55ac00237ec7e2870c1ef6e910e954e7b3ac3db09565b5994c1106985fde6be2945ff1f786a694f001e7fb0fee11b6e632d89f68d0620f7ae48f1ac38132e42bad1f7a3c0500b223f5cad9f0b8b (encrypted)