# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac2ba8a3fad632e501722c80d7ea01603af295e39af60db8e5dfc25d4baa760a
Pseudo Output
2ec35cbb5a30c4b80ebfba167246bf51c6494e6a87e40adf194109bb6d099410
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d25147d2f045fd8a5eb2b416953ed700c3c3a40c3d83b837f7139ffc397aee0c
Commitment
802be0c89fc7e4a057004a7d89ec66a252f1f0f4b0921af17de4fb465f8a941b
Range Proof
672 bytes (Bulletproof)
Memo
1a012c00e201f496561b5ea465ff7c32a28c3e3318cfe9fedd0c45ec68fc32204015821eb1b32ae70d12c112ec85714095e686d9d65d00b932f85841d89f8a8f9e6066b52393c2fc1ab8cd9595a730ecb561df27888749697ca9894316d5243c1c7813b3b3a4cf5c144f97fb4069f4ce2ca94ef520a29da83156f62d90b780cb (encrypted)
Stealth Address
3ca1960106312d858902698eeaadb24de7a1dd80bb2fb348cd82e69a9f934c4f
Commitment
e0a6edd95f751941c6a1ea36113d72b10546468d72133b39da6405d4bedfcb7f
Range Proof
672 bytes (Bulletproof)
Memo
8fba2181c500aaf08b66205c81dc6567a5e6d7a8fb1460db645de7a71036ce11c5125136466d36bb9842861ee9335f8abc1ef6da1436b35ed4f7d0f6c5e5d48a33fb03497fb26edafd0139115046ed8feb4a45ce123ede0274b532b663459cfdaf00d422cc0668578caea5de183e7e89a947eb4ac6939757fba2333fce0461fd (encrypted)
Stealth Address
aca294097009ed0196f58512f5451232e59d7e12664ec139224dd080099a7c7c
Commitment
624c84cd0643d53108065406581fa4c8f5b741e0d39f9f894afd6011d530be0b
Range Proof
672 bytes (Bulletproof)
Memo
ede462df17fc8a757f345a2d794c3ae8e077ba00402183f5f101a96b21389fe84e0e0d93e722d1bd027a3eea62e9ec22a0be370621ad79d035d1da3e7985ec5748c1a02e3abd71071faf16f5db8c5ae97f6bfdda91f997cd94c7d0ed37c1f669b7adebcc4d18936f725f50c8f8cc2bbd7dfba853344aa45db2f4d134d063bc73 (encrypted)