# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ce610c2d220d8336a943a18ea8de9674f2284d3095c08ebabac18ae6e6ec4a0d
Pseudo Output
e636624e40c45afd38bbb23f3e49f72652f1860b9dc8efd9ffa6cda5bd0f8423
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
be50797f5eea906ce33c5bf316ff65b425af90526bb964857aa3fe7992d6f92e
Commitment
687c98deb4c4536866eb2c1fd720568946a61ff5e3c062ca5cfb1e5346092f3d
Range Proof
672 bytes (Bulletproof)
Memo
3aaed6e5ee76aa9a36d6e26ffdcbdc431e4c09a311a719f63de7b153a7bf6a5117c7bf6b66c0bf1fb93935a7afb9c08ee23167c811adfa08c514b5e77080f7c83955a9678c004201bba6f95d817e9236917d7d6beaf69050b20dc2f5315eaab9b3c63ec0f5a93170221e8eeb1e09a0d8f2e4faedd84f9f2bb6fc8fb0a8a7df84 (encrypted)
Stealth Address
88b6f9f035083826793efd839c743040952f0b435465a56d91ed9338880b074f
Commitment
54876f2d58591bdbe0645d0bfdc7479651eeadc4c55d350d2a7c5cfab1bc3f3c
Range Proof
672 bytes (Bulletproof)
Memo
a99f571aef7e3e523c58d75dbc6b544e9d6a02331922fecf343d54686183cc3b19a54e53fd03488964355a61d5ebbf393fe0b93c79cffe67724192dae3d0fa4d7b930bc32d4ff6ae9c401a0f3144bd08296bf1a0a8a75d2dfa0abc114b39ec7ca59cc765f7d58c2d5bcbada66dd392b474143f654c82aeff1038c61f5e57b201 (encrypted)
Stealth Address
12addeb9bdf176a416e2fced8a5783073b75b0431a8aebb3df718f2a952a813a
Commitment
701477fba3495f87e9191fa991d951edf1ac4163ce5a3cbe8c7369134f0e9d58
Range Proof
672 bytes (Bulletproof)
Memo
d3176dc80b2b95782d78c6829480ab31ae1ad9c61ad1f8281871fc084df289cd251bf9379e4844533e925590b4ad241d51017272e5cedd6f83b921df8ecb3ffca0a6f1b8e707683f530eb926723319e4313d10d4612505873d047c89d7d1181251cb5774045b4c62f0d142ff5bd29374d60e8c970eb37ed471011fe57de2aff3 (encrypted)