# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa057786e3efe3e3d8f43492291a60e9a2d34846b79e50a9a30892a7cb66ad0e
Pseudo Output
bae66b665506524dcce9622e5684fd71ea508e63b7e86f4556ffc29588763a55
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ee62bfd8f34718bc482963f6fce0c08717130fec4c384664ad49fb947d2af776
Commitment
36a13019c323d7690561c2cb24da2865d77aebe967c01a78804afc7d9fcc007f
Range Proof
672 bytes (Bulletproof)
Memo
834ff961519f1d78b2ae3f4c5dcd80abec86e8ef421fa2df322f05ccc1dcc3505a26796d5d56f6f35a6cb1d6478bb303e83a8d5d47cfa52303b331bcb67494ed6b2f096989ab7ab39a11e2f0ca43692b0565b33f64ea356d544cf82d964a1e231a9f260bd8629e0ff7377597014a1622772b88ee853d197fbb89323a0575e127 (encrypted)
Stealth Address
608b18c8d7b2f969f67beefe1b14fd4acf58d4489e87b49e4d2a4f02aaac3547
Commitment
8289b9f85e94a37ec74273fc92de2f515af7338f1576f48ec01f11219fba1b75
Range Proof
672 bytes (Bulletproof)
Memo
bd00cbaeb06726522ccd1d747cc88720f594d3ed7e3c93035690445121b6f84224980f04420087199df6f88ca051d68683d7839375d6ae415850441a7d7b595e93a8361f3499769cff71da2949030f0772b05f350965c843191357d1211a7b6ae502073620af98cdc872482c6c0e7fa1ebf2c76bb24008ab2cbbc2e27a585a41 (encrypted)
Stealth Address
902dea601dcd44c8ff4c344202e1614f1ae9176a8f2858f847ecf4a183e55775
Commitment
f0c650189a7a3a75036dacf2bb1e71de9350b89d214759ee3942c219f3734b7b
Range Proof
672 bytes (Bulletproof)
Memo
4cd02b7ca779aadfc73af765a47f9917600323c37918f3b2cfbf6f6da0376cdb745dfcf96938c0e199de97cea86a5545c162ac7d0c0094bd929880fde5b965bca9115757e5f9c8a070b759650279182ba24917762abffeac4395236b92bb4bb0e9b2d107a519a2b8e9b1a399c945bf540278c56542ea3b1a4966195cd2629777 (encrypted)