# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be12ba8926e28fdb7c16f9dc9ac732f921f4ed9768989ade031f13e3bde7e97e
Pseudo Output
baee157b45d814b4540a62286e24ab6850101ea8f1959c38c03da841ef097d57
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2aff5c4d1d97048f0c5a8da3e31a964ddd57514cb6b69e83e312b8b0e161ab7b
Commitment
b82b6aeeb3532ed4fd79d2fa7e83f9fb53f4655d189daf07d7b7b02d40750506
Range Proof
672 bytes (Bulletproof)
Memo
ec5c247335c31bbe133c234dcf8f2fadf631f2caa6ec2b1e6639decca7adcccde482fb2b5bd82812c8483a35171d7ba8b96f8d50a85c7bf4561745b6c05c153d4ff6346eee26a3ef353e4d85c005697523f57193ca4bd41b599e03a14d06d4d273cbaa10e88f0e742045f4cfa7e1e33320ae9b9a0f5b3a53061e75a042ebcf55 (encrypted)
Stealth Address
b6986fba1e70bdcf504a5964265192310be1d6badcec651cc1ee5cee2e50c629
Commitment
28e071e6a63135a9eaf2a984dc6a93d8b969fe9d814befc34585d04563b7d433
Range Proof
672 bytes (Bulletproof)
Memo
30cd5036d71108c2961d32617d5cd2a1df80c4582ecc60ef5601185c3f74a78537a396c304e3de17d0750d73068ecc5d9768300378ba90404e48242d8f5a3a98c57bdaa3fc2266b538c18c13af513da32570b88e1785d7b75c3dcb6ab71cd1f47cae2c15e5514d14bded4fa66e21b4b37243ce42dd8235c15a600058959f19c4 (encrypted)
Stealth Address
c01d1c471e186c90fc67ee3f9c53d05836be389eb3e5b7ba838daf1d56c4e400
Commitment
a480a8cfcdd15043d987461c6b3fb0c20261ba0ea5d7ec1e7ac9eed9b798e561
Range Proof
672 bytes (Bulletproof)
Memo
a43994068599080ce3abf59e1664b030134dbd5d175adfaf638216cb366eadaed778016417601ec411891fddfac6c8f204c6cf186b68c29e3efa7d85ae3c9cd2bcfb238fb3fee0deafbcd704661994268da5270154ff7e47b5d6039bc13200fc10df4294cfbadccaafe4b14713397cac02c1b610b09b4d9cdfcdbd4aa4ad73bf (encrypted)