# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a64c1974b0b1b667e7a7ff0e7805dbc72239e1a5149769264dadcd9bbe1a1550
Pseudo Output
ce176fa522ac1ba42e6b0768bd8f97faa1015f347120e60ca60596f50e61cf54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1e393812e939a2ce022e9dea9298bcc890b88e9d8e5f14ea27a3eb4c79807859
Commitment
b445e4f7da539d66c556992ec5e64221d230e58895c895163f3c8b2bf8005e5a
Range Proof
672 bytes (Bulletproof)
Memo
27e72d26a3eb1b839bfc579eded52ccfc5fa4ca621032577dad164818831342f72d3fecf7066db4eb3a9f9c303b6ceb6aeee8954c86513e2f4e45f7295be5a265c4d0e6622fe9c82847d5055bcbd02076a879c05818264b524baf835fe9f6f9e8cfffffe227be44e801f9299457ef7e8fbcecc551d0761e7e6cfa603f8fc9a76 (encrypted)
Stealth Address
ba1ac6d23a22e350ff084ba4d17d1514fd1374cc36cd23307ac9da32ef7c9f58
Commitment
f2a2e6b3c2eed19184f7f6e3821265fdad0ee2ec95a5dac7c344a60d2fb86b61
Range Proof
672 bytes (Bulletproof)
Memo
a39142036718f688c466db23ff309bdd1d853e46580d0fd752cd81a54b032e3b58138bc1efec98071f5eb49716322ab5b66bdd42d74f41c4a0448018d34761f85afad8285b05695f494de331efb9580572a358a27c508f8a4739133aab8673bafef08b89671d27f65ce0a9d808ee626138248108f12f79f170340b327c3cc1c8 (encrypted)
Stealth Address
2af743891ef2c26552edc69c0b00a779e99804d3cf5ada2a80df4662aa6b1c5a
Commitment
1492db5cc2db9ab6aef1b44d18daa722084201de5403078f4160844117316d52
Range Proof
672 bytes (Bulletproof)
Memo
c20e22244466ca61f6ba877b4dd4c855fed79af9b015006bbf2e3aac72a5e624456483ae3579469d85e68ef56c2829745280ea546e868fe9ee76ef267b1c0a27bd2c98c694c6ddc2403f8c15c8fde9399144203dfc27cda2145cf6abdd605a1afa8eb6455fdc090e5bc797b13c2271a182ad4b41e1e59c752cf1e5418c7f23d2 (encrypted)