# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a894172c3db163146e61ebc94c73831fa2406f317de6f0723299e5486f60547e
Pseudo Output
eee5ac7911f252090c1a9c95f202fa104b3a4b9e76e08a6b5caf0fb1b17a4a76
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26bb7e9d234cd525cb542bd43496f33babcea6ce4ce9b9016f38362902b85252
Commitment
a4587359e75573f2b019fcba6a855f4b44b9e3a8be3276752132afc1b88bfb69
Range Proof
672 bytes (Bulletproof)
Memo
ac630c3b29cb6819fef15bc176fa3ab44d7e168650d794f13b9dcc4a5d5b1e1676b9f267d64ca2a3c7e3e353d03edae1d408a4b85211040d1a9ca477041c8b1a53927519ebb4ad4861fbc200f55fad13c8042bbc5f8c8776f9e57bd97de3f253bb0592519aa27b19b20aa50e1fa57bd8f242985c001fb8b44cbf5e3c2cbca0dc (encrypted)
Stealth Address
e466b23f021f3c7beb0087efb7d38e10a67b899a77600eb4643bdf4555530738
Commitment
485b2a54a333d3bc8ca7be93e53774f916c327c3de5cd39ceffa69b0e20f9f56
Range Proof
672 bytes (Bulletproof)
Memo
7d37a6fdcc25e496829a6e7ca29ea6c6339b4fc88e7381bd926391bc9046ea6cb500c76703bf8615bba0837ed9958bbbc050e043ebadb57d5026ebca10cb7963e8df79e8c20743249869bbaf24cde1f88e1872993b79f29123685d81ab83f4a03728e56344f045ad3f59fd3ca0cdce3bcdbcb655715af4a92e378bc6d9f5c1a3 (encrypted)
Stealth Address
845a97119e85ac9a0463fcbabb309518e23b704a9f4bee20118818b5aee9f816
Commitment
54e108b54b568ffb0a5eeda09301069de93ed464347f6abac861e6acc75d8c4f
Range Proof
672 bytes (Bulletproof)
Memo
8caa5ad53c731c983e708d7137780b05fb8a9b9fde23eadc64c246227678b0efbbe7e67feace1cc69aa3668af5cdef2e65dad09a3e583c4cb09f60d1194d9073718b12bf904dad57773d2ec5939ce220eb0f3d1c7c9a94d7dcf08d2aa481bcbe5a5fc635304cf53e0f575b7c5aa220ee64cd50cd26e8e40cfa00413b9b1c89fd (encrypted)