# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
84634aa254fc2a8689814135843cef40c9db27ca4e327c40bcf8539eabf43906
Pseudo Output
586df171e2a521d340d306faad1b3589b64ce5c93cbdae9cb83ff4ce9d4d6565
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a24526ad27277fbffb4ac314046a4902f4114a6bf88fd300205761f267832341
Commitment
e66ca70b9491e7da5cd88b3b137bb25c9ad8b75c38467273ce507613b438f55b
Range Proof
672 bytes (Bulletproof)
Memo
9def6bbeb4ddc2d3bf2569e6baff528feb1daf39186c852d4c46f7d20531e6bc7009089212d0102b32e5052686ee1aea2d345c79c1fcac91e9f07dfee5473409282c374dc38832b59d3ee350171b38d7e84955389a0088053f584672e9e12c26f80140ee155c72c15011bc21acc416994092da1698f58be440837e2365350e6c (encrypted)
Stealth Address
28e338d77747577ce39bdc68eabb00064c0fe175537a452feee036ea89da190c
Commitment
3c1cb0c83c54ed7d65d3adc8736cfc011b69a2656abc17b8a67b1b898977f20f
Range Proof
672 bytes (Bulletproof)
Memo
b7aaf3d7313a54b79a18ae1e0dbae3fd87606d95730860f592688f14fbbf9b943d03861a0d6d8084a57873346f8ccd5a23ea30397080f70c711bf998a3ca21d525accb690c1c1c67caea49a051647baca1b12ca354707e69dea2d07d35adfbab44fb89d3e216d8f70a61cf9eae20d01708c5ac1128962b3ab46adac26132da0a (encrypted)
Stealth Address
02535312e4bb0da86483504f21c0fbfd507971719fcaefbcad32599a9840a510
Commitment
f65fe9aded16c1f28a5a2a4ca78389e5d704017fc1a871ca3431cc00a8368528
Range Proof
672 bytes (Bulletproof)
Memo
51779ff40e2dd7abc914b05f788712dff32d3c8abb037f37ac78785fc8d207ba257d520bfa86995fc5a90a8ff221fef82aee0e190097dfedb730c8d305cb4d85e2a4a3fbe87e59b415eff9ce8d56a90c169900b08ca1161151a74f73fb365a7207d18f93bc102ff4555cecf3021636a4dbcd4944d22c44605cd09f387ae29f85 (encrypted)