# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4eb5b46953f497842d05c9225875a271948fd870815ff2e72e1f6610e1fa5a4c
Pseudo Output
620adafda8c30364529cb47ea2fa7edd6215a5a6945143a18e75432d8e89df32
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ae227fcbb5ff9bddab765b6416238a91c9ddd42242689f855b5f73c578a3bf1e
Commitment
a8886eaebf5111f9372e8a5b0a9dd4eaf11190cac866a69c98f1f4dfd3ebf265
Range Proof
672 bytes (Bulletproof)
Memo
7ab8d0527db1f5b2bb685e55cfab7e9f0eda81512e87549dd488d616f7d881025c38f93cd5f918cb5aac3eb33b4ba770dacec11b2973cef6feaf21ec799b0332c741402f4410e9ef6d404eb49e8a8130b6bad3006835071a1b8027ca8fcc0fc5d103cfbdaf2e6e0e0e0fa1d778aa94beec06e77cfddee8175545dc20d6b4bda5 (encrypted)
Stealth Address
7094d3e02258f531351674d89ae1c67f35a492de99c151f998f4d61b68721b2a
Commitment
68eacc8b252303ffb31f63ef967dc29bb03309f5e3bdcfd8acaaa6366d4e3c33
Range Proof
672 bytes (Bulletproof)
Memo
2cc591839a74a458503663ab0851429d163751f7051bbe9fc28ed65d2f3fd1062759242fbd14d079b79b237e941c6679ac75db22d592672e3c895dd5535f9b0662575468d4ab2f5c013629d0687658c8d6cd124f5adef88de392d7905cbcd24157028aa3caac256c483b115b3de02a5d37b61c6997fe2f8309e29421b66cafcf (encrypted)
Stealth Address
563c5b74807d7a591dbc106ab0f8cdb7b25b4cebe8546df016d99eed45d8cd18
Commitment
e0f689ebccbb891dad5ccfa4babda961f600fd1a1ec4eebc81460d8bc2bf3035
Range Proof
672 bytes (Bulletproof)
Memo
61a5c6a251d422e029fd856e2cd695f734b66ca0689b50823070afa1cc58bcef96c0c857e8814843081921098165e083f3b3fecbb526700353c1df4e02302dea01ffb4dd2d74ac290ab7697b3a78414bd6d48cc2cad04b0aa02810424dafe0307fab225c2da51c3ecb4db29c3a6910bca92e024caf48e3db0fbf060fc9a3f82d (encrypted)