# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4641d0e1f15faab406784c798e337024833cc3dd63d480a1359c66f79bfaec7e
Pseudo Output
285e22200d3f0720b6a9e3b9a1310681575b7e078785cdb28e62e26dde46ae4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3ae5a1dcf40a12f193c455ce492626129025c264a6472f68031e82b4efbe7b05
Commitment
d87f191b5463d7718d31780e652d27d76486da236d3d3052fb6c280040871e0b
Range Proof
672 bytes (Bulletproof)
Memo
12528e495a8c58407dcbb08d9ea9612f292a572ea5dbca8dc0ba80fb7aac539925e441fc9c86d4521bf3bfd604f945c5ec3043836fcff1900a0dfcd8866f60caaf3f383dc46829701636494917c0338d798bf2faf5beba0a647e5d5960e44a638488fc0cdc41210aec8ce55e03b31b52c027fcda0e1bff9e75327ea19a9f3c66 (encrypted)
Stealth Address
98faa8750739afff94e6920fed1a58e90b8a78b4eec242c098cc2a5a42c47528
Commitment
f600f071400c099e97f74578962c56032983774927b65c25f436d3c7e91c6f1f
Range Proof
672 bytes (Bulletproof)
Memo
ed3dcd5e5638f6d50f8331870e2db843ea5283219c2b73a5f95d4d6097e980c46399a77ecaab529941b634bab4fd143bdef9278b619b4133104bc857fb565ba8bf1551a5489d9f8dc6984dfe44aef526c34c5d641dbdfabb081071326a9690f8263ea792f2edca13d7bc2322f7d66a8e9d3c413afa4de5f230a0804985de5a11 (encrypted)
Stealth Address
ee6ff7c287009eadf6f319387d813a945f9242b9c38cded1b9a4d3f7fdf5bc43
Commitment
a2a9f919f60bb70c6e3deae4beff4548300986a827451bb7f55dc362d10aa17d
Range Proof
672 bytes (Bulletproof)
Memo
58f5eaba8d9b401b9b843927bea412e6cebc0cf58787c91703e23e6879779607af9e1515a313a90fa6e2e2f1b64734b2c48eb0a6878ba51e2454f3dc11ec3f42822952f26d5a77cbb8b0375028fe86d9f9468b7ad824ac919ced11488a0e612a67dc8093b63597c7b2f3fbe6c509ac00d3b15ae84352004b9c92f2b53f69a539 (encrypted)