# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e8ceae8a81d2487c8ebc7b583e0a18772bf8c2f842b5caa3e711388db91b1840
Pseudo Output
ca8e4da9ea26ed7263314989b6199969f2bb2fd68868ee9332afb373dc052770
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1c72cb2aed3efc8a612e83f402569a444686bc05c255ae1d4632501837fb644f
Commitment
ae943094864120c21e400f7904065587b6f109abbe573ac58a5de838bb7ef41d
Range Proof
672 bytes (Bulletproof)
Memo
220293cccb867de5c20feeea8590de369739c94093e47eb9cbd7e186086e99eebb438fe1d75466a9230479c6c8115ab7f2026124d1e06c1d409b014a31290eb014d1d73f6b01722948db2d16880d79b9e04058ffa67df7b7f0babadcf10b4a06cd6cca460d51bcf59ed8b8cfe79f2db13309bc338d6a82bd529c3a21e8403f7f (encrypted)
Stealth Address
36170dda153d1012a04b1fa475c921af9998dac58c9a70580a0eacec8dad0264
Commitment
a01ef065f24efdc302727902646a60a7a47c72ae32c3fe157ea99ab5d94df771
Range Proof
672 bytes (Bulletproof)
Memo
7ad81bbc17ef713a07e34515d71472d4deffa0056613c153f1c45f89032daeeeb61681e110f28cbf2d0dc4ea30e815f7fe65737a1ed3d83d9c24038632cc695bf91f64a3dee9b6ddbedcc6a8168353141d00853f38ada7b1d5dc09f901dbf685123f2fc59c4b7cd322dca6540cafdc8592abe1cadfc2374d1d4619679e0a98bb (encrypted)
Stealth Address
3c2b7a6ff62702e15fbbc706476eb8b7906b95d9298de35c24282096d4b6e951
Commitment
767d34f2a5a77372a0c7564c7f32aaab12c71d31a13a75b554e0ca215da8406b
Range Proof
672 bytes (Bulletproof)
Memo
cc123bdad4ac4a6342c4c682d7e5637b4ecd9cf451961de892052a883428937dddf27165871c06af6bc7fd405acab2d991c10d7308bbcad836be416ea4aeaf974511d37d19a85508d97cbba55c43b65b3412d9609149ec4242186256f8e5978480a73c6f661f931811c3468c13adf5198299890cc709839a16553ae2c2148e6d (encrypted)