# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2d14e87cf01a1d04aefbcadf5282206db8a0beac32dec6b108a8c537312a208
Pseudo Output
dad644f2c15bfeb312e160437f14780f1249c60601be6cb93aa40ba7867ec518
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ae23c76badf419550bab9528592c4e4c9ecd615e9e060721511568ef975f2a51
Commitment
1686c8bf1eaab11c61abcbe1f07deeb821669a8d3d8db59d9e2419e928e34c27
Range Proof
672 bytes (Bulletproof)
Memo
926ac9221080ef69d16c073a8b62399dea4bcc85741ba6f9545f300774a00ee680202016eb5009e3b76f5484405a36b7a90be0159969d4a5d12a1fbbbb882a78d3b06104fe2ddcf10b38c2e5a130e1ee7fc33a33d251bed56f53a1bceaeb92bc272efff12f107198730d88e2e64c095aa596e68c61925b31c7c23133baf46c9d (encrypted)
Stealth Address
3a364e3bb065d6fe107635d6d7788399f124b18cf9761568693973eb9920d90f
Commitment
1c3bfb957d20adf52665ec664e2da19b93b8633ffca233a98e69eb27c35f5c57
Range Proof
672 bytes (Bulletproof)
Memo
e97bb7386dfd52fe38a6d762e5fb4f939bc21c91e267d1cf6a23f83ab9d35e5c57f4c68324192088f425ada231db91353bd141732869d56444254abde0c9f42abf270ffb3c919aa9faf4e312a285352b35e2122cd1b28bef5775a335d77d62b456151adf247ee53c7d9ffe32525495434806122ac691ba4157f74d9f587402a8 (encrypted)
Stealth Address
861a650ea022dd954fe2a2d1241ee7dfb76469d90bfb3569bdbafb18dd3b475c
Commitment
4ab07c29a36170581305bb161f857d21774b89df96ca84d49d5f4b3c4d270678
Range Proof
672 bytes (Bulletproof)
Memo
f54b43dabc94fe466d0d1c01814aa93d917c38d998184c97d369c5d582f7e2b3701114923664b17076030ab95ddeb366d5d107882f63d04d86d2e2fcbac9e12bc4eb85340168adadbb60092f2d4d3cdeaf8c21976bbcabcb57b40771227bbf4d2c41e2506e25be9a757ff1e4f2a4361ddfbd092a68f85ddcc7e4882fb6681b89 (encrypted)