# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
001892625454c576f3077900633299bf04fc2b2ff5c515ba7398207a65ba397c
Pseudo Output
aa2b1c081dc428b8946f3a27a6f190e53baa6d288e30af25ed52a6b50a65e71d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
32075798c1c79228d7afe77ba0321280dcc88ddae2f019db2d010d70d66bf245
Commitment
1e465b7add030a43da2f899e8c39594f8bc3f49013fcd51c408e800f850a2928
Range Proof
672 bytes (Bulletproof)
Memo
7fd1108ced1a70fbaaeab59b7052d101e6f9debe36e19c2cd2d4556b0e1330225fa36a30970dbf09a48b5609ac3e9ab5410e13124d68e6708968a533ececcce10c12f32fdac47ffa7924662e6cf860fbfe023bf547ab3b29f6c74b6c3eecd8d5cdfe0a6a5053a55da827a921d62965fe2a501dec2d3d256a530eb0b3a624bc08 (encrypted)
Stealth Address
b819fffb61fd38fff4aa91480f75280579c38c58271a90a2f82cbd658258f345
Commitment
70ab5d2815a418f0b988963b1592d9c757178da68ab1766de00f4b399787df46
Range Proof
672 bytes (Bulletproof)
Memo
7124c159726b990e096582d63ba02861bd2d07031a738676337208f3aba77a5ce13e49a4bcce932b3b7b6a6a75b68f50313f4bc01408e4d334473c0f2f630e423c7524c00027820f7fef2fd47c8bef0ce52048175d90cc3bd7477b8ef15929de389ecf52ca1b8c184cc9a11ff217f5cfecff0864670cba1b87385230b261214b (encrypted)
Stealth Address
e42248014e4f30461dc2097f879fc29ade8b5b35ea22acbcc97b6f829fa8830b
Commitment
8695813618f8048f0647d7da54c34feccfe58da277693679afa939d482328a43
Range Proof
672 bytes (Bulletproof)
Memo
3d128884d58850181b4fd3c934d3b4f25334f1e9b4d3cf152e55a25e30ed6fa04c5e84e43503e6afad52c7ccc4b78a417535e05e8edc1a85c00647e65df774f3c4a04b663f360b5b0f6063f9c33c0a4fd5eaf59160e069396b168832cbbdec409f8f7262b8ff4a73d7d16c9a3c9a92c835596aa43d2a904576cae7b6dc6cecc0 (encrypted)