# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1ab3418e40e11a578cd0570ac2b66126136ae508c78040adc61fb79af6a4b934
Pseudo Output
ac5d9c4b3e7804a038fe7aff9fec6d97f1143b51a09737c73068b324ec782820
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ac1ca1d574b5cacbe55161637801185eb35869e059b76787dcad4c51f701fb75
Commitment
784ae30d90d9befb13fd15d3d21740d9641cc07ba1c7a48b87976164140d0a78
Range Proof
672 bytes (Bulletproof)
Memo
2e73dfaeaaa8a686d5fe5171c1b81928521f0d059ccd2310c30fe9585acbbdb13bf493a9d8c84c2e9669946b8eb5357f4d955992649366b82db26d5a48ee92f11bc92427c69f6ca7470d6d9a20fdaa5db38c155e49914752b59d38e7350f09a15b6c0d50942a6ae8a37306ca78e3a9a104764dd8c6f8e9dfc1c6d2d6c10205dc (encrypted)
Stealth Address
caeb2ecc8774adbe21b4dc188a6b6d0f8e6a6975c897b22c020d691fc74a0477
Commitment
d8a009230b1feb951a9eecbb971ea29a5d65c53849aef30b16919d9fe221585a
Range Proof
672 bytes (Bulletproof)
Memo
236f618da35416a350ef0818bca8aa78ea148be194efa5e396b8530374f77ac61a47c942df7c17983688ba687e38e3cb83654134ba29f3fe3182b3a9051b160665eb577aee0fa2099db30c6e46e5a812303f58ed9ac3e3fd6bf2b174d2a4ea0c81e2434519c9275111a94eae0b7938f364b99138f46b7a49710508048af84819 (encrypted)
Stealth Address
9656df3549a2a2b9b85271b48e77933d2537e8f8432349b102966257dbfe0a4a
Commitment
ba9ea802d753759fa98924075a54317083710b797c42cdb23d729cf523b2a135
Range Proof
672 bytes (Bulletproof)
Memo
d9939181b52a5a098b1915ec5549fe3b62e437a1f2b402851fea73feb8dcf1fa517956e715640b0a658ffc34fc1a6e2e2c12a42d0c018f115674963e51cb70d6d89bf1b6bbb2801b6fcf77b67a8441f7a5b40aa905294557d2e56a0053893d022c338d85a60f5284b4d2f4dcc1b93cc838fc8e963d4f043bf027515e651c1fa9 (encrypted)