# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c07b751a444c3b9a4806b8c914ad2621c642383e253e02e1bad3f7a1d4e3c005
Pseudo Output
b21084d073f2df30538a1a2e98155810d38b2c1f33fd28db384d586113884e60
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ae9fd286ad4794fd182fa6a27e44fdcbd82afd3adcce15bea2118999d6023472
Commitment
0210bab2eb904d7af515667b1c080eb415651f445c22b8476367e51159c2a21e
Range Proof
672 bytes (Bulletproof)
Memo
171b286eb86eb517bfd208c5a2a1efcee4478398083a0f33d6a2e046dc65d2cc2aed1d3380cd7d1e14243f4d60e5d63a2f455e9a66da833ea6d1c6cd2e2085b047eb89d5a5726f0b85897f79137d347377cbb16772f6a7e920df7e8a54704964d938a50f2ee48244d33b1a449aef8aa42a32fd59a175caa5bffa25e2496872d0 (encrypted)
Stealth Address
bc4b3954c7d3297f19b9949daa2cbbc2a726d8dfc1518ab79ec376e750567316
Commitment
c41d5c2b55ca17e4ce3ad952ab9419e70c20492166d343b4052d2d260473b325
Range Proof
672 bytes (Bulletproof)
Memo
eb6cb32f358f1291820fd1f3d559aee0e2740dca21fde95aacb4ae2bef894511732e4609285b68de624c29a43845f75a3ecf4bc7c8852d68a7a98dbec5ba35e40e006afa0e2f74a7c81d4839c3c5c2ca45ab472760de5cb7b6cacc6d413aece88e173d972d2d7a7238f8ebeaa9c60735b45eba949c48e713c7f110b1172f980d (encrypted)
Stealth Address
768da459a1ceef52f399a1c4c7f7fe59834dc1869257ab6152b4f39eb3ab5f26
Commitment
eacc4caaa784b2dbe9d8e0159126bbbc79b870e7667e8d2aa31922d218c7f54c
Range Proof
672 bytes (Bulletproof)
Memo
a2f9d3df0161ef00f21108852e9b9638ab85fc980c6f19c0a1212fae1c6fbe4527b04bf0a2b031579e16b491762ed5f3452ba55050ed4c7da2c0cfaf1a6f297b051e6a2ae99e617141d3493878f9c6932e5b2158965e19f4b19650a77457b31b9d48e470177920fba2ef3dcb20c327dd6211488a1eeb72fb1ecf52a7f6cb7220 (encrypted)