# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cee8835183f4ea7a500e724705b8dd988dc2336583d3931f7b0bc0c4835b2768
Pseudo Output
1458b26cdcf7999020668fbd797c9979b6f8de460810302cf0e93e32b31bff7c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ace021df46b58680a8989512c277189cc52534428eafb14eaee8465e2dc82f50
Commitment
d4bae8fa878495277862782c64cd03d97ee08780498b476404f70c87a9a67c77
Range Proof
672 bytes (Bulletproof)
Memo
ef21e75ff754a8340d73e6fe02ba0ba2eeff059e49f75203fe72dc1a4cca26640d8d93d3e67be06272b082591ab3ab9cb4402f08e4ee1c8eb43c37a8687b301a2643e39b83b58ded685b3332927b9f9bfe47c1cf9c7964cf5c949e451546898e86dcca1455b8ed32a5562305063f5f1fc67a88c21b8d3990eca791655277c2a0 (encrypted)
Stealth Address
fe8948c6683893623fe1079d87e2dc414d93c0724360afeec9a98e0261af7d73
Commitment
54dedfae0b1930959101c4f1ec2d64461397c6e718872babd1b7c3ba6c6bf64d
Range Proof
672 bytes (Bulletproof)
Memo
596ac5db0e8dbdaa68e87fc6490ce89d657461aa6ae8e07506888adc6ce5f4747c9668c247bf5f4758cb6ef7c080a9133ef261f39a62287626ae82b9543746e86ad60246ca4fe9fbbe3897bc7ffbc1fbb5f0b233c578839086841e6b95c7096659a8021b36d1b9b370161b1c0c302e5dc41494d9d5b75ae3987a730b2d111375 (encrypted)
Stealth Address
6429a4e7b1e4398f4b3886b1d2393d30c413b45d9839a079033fa6063814360b
Commitment
188438c3fdf1916b9ffe889e6e070e05dbc6a630312391ba4341c9c3ea40d952
Range Proof
672 bytes (Bulletproof)
Memo
de58f65ec5dc6c57d8e4ab66196f591674c7f1cfc9988e995b40d3006baccfe7e519a7603847853e35b8ba9922bc39ad73e6756006d502a26184c00a7984d5cb8597ba17eb0aee365756b24dff62ec8d23ff3d391c67a20b634e5f462c960b4734228c0ab890ebd10c9376e4f9628abdd468648a26ec366693436c4a3c2ad280 (encrypted)