# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2eec84ff7b18d3e0efdb111ed4eeed511266c27ad48addc5b7f75ed418825828
Pseudo Output
ce578dfdd10b595aba7d19a6df69cc71de3e8bed12623f6304cd98d25e0f336e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aeac30f6ab09e082aadc60e3801493728c61346f5541ae810482c0154d14c70c
Commitment
bce2945aaf7b706d22175139fad366046e2fef1b3b9a88ecd14dd7bf1d894d0c
Range Proof
672 bytes (Bulletproof)
Memo
57178908edf42944badb979bbce3d8fbaf8edca67c78f9ab6e159d9888b32682e21ff893076d83f654c409366df14f93d9eba91bcbaf789910ac6a19ff4c6ea394c1348a7c39b7fe5737a46610150c8ccaede0ecc59653581790b1c3ff63f3ac6f21f40310877cec125134c7bad5da6c0f3df0596747c89cb8daa93c6efc4d43 (encrypted)
Stealth Address
10327de5bb7931318a40ed5e7381ea7cd81ba4194fd59c70e155a83931ef6826
Commitment
3ad01a72ad5c268ccc4793ce20151d80b41552365ba457eb71937f0617a6405f
Range Proof
672 bytes (Bulletproof)
Memo
018cadf815466b55df3136038772608327d5ad349c6b0ece6ffe34fab3bcea800214a01efa0097d5656ea02e07d21974dd078b9407df3139a27099382106f8822d380593ba49879def9e45f7bea09eb0b38e84708793704ac315d97739143ec989c8fcdeb5ddc2f0c54aaa180373451227cbf657232e71cdc27bebbdc6e57f72 (encrypted)