# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f26a203dc137ce63e27c8f2f18130ec24f5e05c099c30407d7ea6f4852695e2c
Pseudo Output
86016ab0af3501459bdd528736f1a986f99f0a38d1160aa94d4e3f475203ed20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2cc1b99534dd7091e4fd2299043a5705af988f8cbdc5a1c0c59c49402c938032
Commitment
ea4122b9b69b4634adb26ef24efbb5fa8100d1754defc2e3d467e320ffdafb0d
Range Proof
672 bytes (Bulletproof)
Memo
a238cabbe11047480a4d2e6a8753404df3c06b033df0abe3ea8ecd9c64a610ce912c0fcdce28c47af51c7aaeb30140b736ff6c1c136227f85e85f037b2daeff2355b8c264d920fa1fee7420483ce7f033616de10ffaa6dfffdf4af556a4d32f54a9993b3140fe3a51134675b55a6db06b05c452c2d456e1c3a21362cd3094bf5 (encrypted)
Stealth Address
f8a48c01605037e7e9bf51b40be2c8dcbf670aeb4a700bafe5422fae09ae2843
Commitment
24d2059f661d333929d0525d7f6d1ce5dcf47ad18a00a804fea0f2323d26cb6d
Range Proof
672 bytes (Bulletproof)
Memo
d7244fea069ef5139c65a0f67dd63cf8eb6306c11cbbf2f832b48385f179d99afc3a2917adfd2774aae9314477e86ca10d3cf92891c2d2881f5168002a1e68cc31ef63f35434941b0e2ad8378d003f64fca7759bc12bd2f2b8d10418ff2cba8dd910b61cfa80598d364f1ce0ccfe60005c5652a76103bf71282e7795b0fa0eb5 (encrypted)
Stealth Address
063059734a6afccca8d7795adc7ec2914571cda5670c017f0e658b27d1d0741c
Commitment
c8339089877244277c19a7b00ce15e9e21d4c55a73a6128282f9bf93d7d3e768
Range Proof
672 bytes (Bulletproof)
Memo
9165a4dcf023afc4e9d05e68d87f21cfd2337b4002def7be53e23aa42c171e97e5ade43650b02505cb15b9356b10cc9119179b4aaade15e9c7e6bc5321a1272b15419c357482a8c3bdfc40fae109776c78c6c86596cd74dbc36d748fe544b4ca8f96ff48c7aee06f0b6952fca0cb91d718b62acf07f085b7b1ca7833794ae04a (encrypted)