# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
64339120e4c0bb520cf448d2b7787f1ae5e1a15482e5d84f3dd355dcb09d9c1e
Pseudo Output
5e509c27b2d7b457f25fd6fff59d0c2063d92f82a00106e407f92b377ebb750e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96765a4241cfbc671ce1a3799ac1bfff72a8042e70abc01f11cb7c5ba2e91b46
Commitment
baa55a63baefe266f7e9cbc5606f2b1486ef78dea01c7b02c491843835b77555
Range Proof
672 bytes (Bulletproof)
Memo
ec1bff4c64b56f229cf27af45a33e81a376953b920dc58bec9a3a3843c4c6979bcf00909db76dbcf7e3a7f8c03321c639470134870fb61256138beeb2d5a9e2edeb325f94bdb2af547b35fe621772d176d6663950d78b9d7ec0e54c6ec01bdb8c5dac3f89c0b1d437754601ac2948fd1efff146b0dbaf726745d3645c601518f (encrypted)
Stealth Address
6a2bd06be35b8f23fe909d1a27a21271783201a1e05788aade9fc1db5e20a701
Commitment
e8d5c2fed77b1909d1284bcf11c0a65f042cbc1347b8c792a159617722cb3c1d
Range Proof
672 bytes (Bulletproof)
Memo
ac31982ecc70423a16a80c69930f6e51349d4b82f194f1a68af45411ddc71f733c2abf3395d0b1f344f84ea8a7260d7f2a081db912f926b2d29f0dfdc7392b912e9ac880cbe677a60367ae15aaa1a04ef71a30d4a2614f61f99e91d2c54556fb9975b14932be37eba496bcfa11ecf9a19c7675c18b53780d20373ce104e4ef8f (encrypted)
Stealth Address
b8701cc283b2ec246561c56076bfa305162803bf121e2b6bd091bd95251f8f6f
Commitment
46aa54245e563954c2ee2519f22c794de47f79bfa1de4620e2ca8d8865c58856
Range Proof
672 bytes (Bulletproof)
Memo
06ce1b1040f91576e35b7930321fc240451b33206be812933251aa22e3847645fa4ab9d93513fa3b5c227edaeffcebea863ac2c05c75a6c617abfc24a4d7aff61a7d46957fb34e7ee10cc53618719dfbb2b284e8dbc64f076f80f835757c3d33d7209d95314b1f68523e8f396f4e1a4cb3f48ccd6805d79b4d8f5bda0f10cc07 (encrypted)