# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7cb50afb6bf69a9e661cdeb6c8015c93c4c9d45fc47ea5494b974f6fee006348
Pseudo Output
f419b14eb2027967a50b7ea9fc156f45ef6b075a96d0310f52e9b07a8215b076
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2e7bf6fd727b11129675a2a8ac7c044cd1861180011c4c6f3336144582edbc56
Commitment
68c19ac7260819aba5946a063c61475397f92994ea06463560371ce842591815
Range Proof
672 bytes (Bulletproof)
Memo
153c39459aacfafdc8e41710238eb0f1afffaa531971e7a86c752f5e22ff150d3b8e81cdd22fe413b8676e5b55b7daaa0dacaaed66afdb886a433f12ac193d8d4a1887f41677ae03fcebd8ca14842d321e954a09c9d74fac343e60a34241dedf7cdcc7355127a6cff75cc21dac7fa6c9556672662f220a6f884acc74cebcfd69 (encrypted)
Stealth Address
ae66e2ee2c766888ce4005db9fbac65ab73cee0e2504212a1c1bba6762326e63
Commitment
70758ea3f324e18adb4ce53c9591de258c86012ee836f4505681ca9ecda14b4e
Range Proof
672 bytes (Bulletproof)
Memo
2209cda7e0c2a5ef699c8dcaefa13a0853aaff0b5defa1444b8bbf403f84a23a8c90cd5db57579d66fd4e21e8089447510f7c111049fae587ee740cdf1d46ab45faadd4c23b78a3a92de5f8819c3114321e2c4ef58ed98efb1ae72099d034f4c60da23c39b3f968222158a251d730cb8237fa57eb2566928759e504fb11dcc81 (encrypted)
Stealth Address
42a7da101591f393c846a243bf126423c2ff8f7736cc10ff0fe163c7c5a5da53
Commitment
046b7ab329690843c5e083373c6cba0d5ee1aaa8d85e2a114996dd12db653649
Range Proof
672 bytes (Bulletproof)
Memo
fa577258cef07454be92f0fd088238640289a7bae74b2eca5ae69bfe87ef666040e14bc3477d44c6fe507c4e6016bcac9e5c46897faf80b85b702d10100ce21585064cbcf303b8a140267a1d542cc07458cc0cc2362d211a8c150cc6f86ea4aa4ac95b62c5000d7f39fd2088fc89dc29646db4f742f98a3ccde3d0a11df88dc6 (encrypted)