# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b2593faac5ab8095b180ddc5fcbba407ba6a85fea6edf4bc9b79f898005d2771
Pseudo Output
ee9820181fae709af764cd8be39cc4bada29318fa37100854d329e19e0222736
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e24de15909db24a56fafe4bbf5e9e71b6863b2569d558dd85e2a08aca351fb5d
Commitment
c6268a8f817955f95bc23bf0d5e71fbb30d34d829d116d8244c5514f7ff8a97f
Range Proof
672 bytes (Bulletproof)
Memo
3641cec6e78fdafe80465d1fb87a21a105c87c66388c6ab73e96d5c26f6ca91321dc77de85220a40ff1cd3a7808d6620100f17c8113e0f814d8742a913294263e331ea89cc63d1f0e2960785b8266b14f204ace26e117a1d0ac5c4260921bdfbf6a377bdd96e83fecb4afcf2000dc45c7d782dda9dcf2577847c9b9aa33de7ff (encrypted)
Stealth Address
449fe0ef1b32451951d52f8010c4d23783cddcbfab1bc8f5ea6690019f0be15a
Commitment
f213a203bc5366833040b36c0066d6436cb25ad9071a60debb33c39548c89b60
Range Proof
672 bytes (Bulletproof)
Memo
aea2dcfc9003bb05103a4387c34e84fb8679b59ed7e62ac3649618a9a9f1b7565e7ccb009ac11c740353ad7a77d4b60141b3e9bfaa423ddb39c110991c1bf2f503c50b5c985929afc3b53ec9f81eef934e82d302cc7218d4c71f0a82f335e5dfca3949c8aef23970beeb6d58d66a7cbe1c09089568a6c778c3f563d7ca1c331d (encrypted)
Stealth Address
8819d4fc7e9605324cdd5139d3cbbcff16c46e3d0c7a1b6ace7880ba92bbba26
Commitment
a6d5c5efff5db7e774d9940caebbf6cdfa5471523b3011565a2fe89f95850a5b
Range Proof
672 bytes (Bulletproof)
Memo
fda1dbee6a28851d5e5867c8ffb4dde3c5ae78fc126b3be6117d4492bab2127f5a927ad1ba4b97cf5f19f28cd57fea13b8272a8b3ac2ae4ec15625227d3f0f906b2215c5a4abc4875aa743ae5ee0609ef968a8c966db87ba8cd47ccd9ae2aab62e84fdb2e7d1416872572920e9e50cc5bc1e42e42029af38e1f344f4a1fea924 (encrypted)