# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8f78099a649c25ab4cab749aa1998690ed0f919f98411e70a98c2a3b28b2c6a
Pseudo Output
5ac14468f0c459263b50abb8ff8f612a574a88600f6d144b8f6c50c1793a1e5d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eaac89df01b49857f797016f95900c5ada7bef99189a4256a16fa41dae6bfe10
Commitment
aca67983b4a252b9b1ba1240303a1c391491d9a3f9ca4e1abf45842ad1ec3f29
Range Proof
672 bytes (Bulletproof)
Memo
95a0fd4f60c698c48bc125959f537027e071d54b6b7ff878383a857ee3340cc86028ba2e794ed505ec2f0ed866d5d7934293b6c3778a608a7341be538f5f4fe79d283c4e67978d9dc23ddd83a793386a5995ac2754b20388c6147a10021d5d7fee1b21e346ffc8ab9d4cb43abba11504c764289cce0e95dd37a1ce4690915e5c (encrypted)
Stealth Address
ba95be4f99b16a05551f362573afb8138f8bf544cbba390110b5afea5609ce43
Commitment
6a19eee2b88edd057b3ab47c12a5e55bcb54a64becb983a7a05abd442e51952d
Range Proof
672 bytes (Bulletproof)
Memo
e5b066ad1897f35c8f51571f24856b7cc9770ec14b6c8e5e620f265028ac9a23ca69afdc71661acd1c3aab4b12672a8b879fe47ecd25a4fd957e854582b718ebca5c95313762260210cb0c8947bffc8be6e5c9aea3bf5f998b65a1455dfcaa4e825e18f67bd8f8deced0dca28eaf0bcd6777fe788229db26d36a9067f117ea09 (encrypted)
Stealth Address
eac98d0f0e01f0c05b0a46a0163c78fbf92c58d1d6b0777e1561515455dfd56d
Commitment
c6ee0ee6be8485466d5c8dee4e7b5f3b0dfa2ca752ac30e5e0e9a476f2347154
Range Proof
672 bytes (Bulletproof)
Memo
1340267710b0844b9a71f4b125778b149f9462edc3fea3afe6f7304c139e49cac0a6a176961f06d41f9ea655d5806e0bdb47ff8bd5e27c22e001cdc1f4fcede72edbc2a56b4c261f392f04fcca93a5374a7f0b2d3e0e55106b279bdf519b0a051e0ae0b946d66f3fbaddc9218e985a5517257ef0eb5ac722d9fb682d7a06f565 (encrypted)