# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5e6fab489606654dab549b5eef9f2302172816766c168b091224eea405dc6a1a
Pseudo Output
e2ab40540d64376035c0c74373c383790dbb3bf142cf7ec34f56c21004264717
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1835a0ad4ec0b659cb0c95427a4f3e8ed758fc9360cc6dc73b106eb46cdbf02f
Commitment
3a19e4f37b8beb0ceee84e9817e0c24c0ea73e35ec2358a86e806bcf327c5351
Range Proof
672 bytes (Bulletproof)
Memo
448125bc25a9e589beb2ab3b349b3eeba875abf43b8031c92f05ec02dc65c53472eeb4e5806b3c1958764733ab1e9539f593b36efacc13ccc7c0caa3faead1900657e399a198ee149cf3ca97adc51e4e76a293a1230660d92fce401fb5e8845f50c4003795889a34f3334f213dcbdcd31ce739f058c569df8b128fa1b4e3b376 (encrypted)
Stealth Address
1e456fc67ab98764ce97f9103030ff142f38e278a0c15c87a3b10b7b816cdf7d
Commitment
065615c8c153407e8ecfd553d985b3b0fb0281ba69908437cf24e080a25ce12c
Range Proof
672 bytes (Bulletproof)
Memo
dc58d78a6f80dac4c6cc082b757b24781361fba23d65e3e4a96f20eec5a07645b48f9aacdace0e43be6c27c8747fb87bfa42522e4904caabbe3a117234fefaac8fcabc3ab3b8826468d064a69f4e1f58fe8a08378fbda5d4124536b6064ade11eb15961518cecf7b17c6ca3d56602d51cb60227a9588a053dd895a5853d5cff5 (encrypted)
Stealth Address
18b456c61735f607031b984145830332aa9cdfbdeed9dff7a68186530ec5f321
Commitment
f2354010de57d7e6774494e4342031724eaa4c882df74891f756bc8fa25fc40c
Range Proof
672 bytes (Bulletproof)
Memo
0231c42edc3b4170395ffc2afd28030832df4e4013c4179104710a5726cf9c402023c4b202fd199841f3c7728ea7ec553a74a82af9ac13507f7259531156941131e9c9db764d3dbdfb00977fc3156c2c0c71e3bad68a64c8109806c6529a326fa58f9b6ce85e276cf09bf351071027064d64cade9a8212001245293fcb0c1bc9 (encrypted)