# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aebfcb4c5f0f1647b49126da25fda25b1b6385f7668a4bc5cd0e25492ee07d42
Pseudo Output
5c031278a381d1e7ea297b30dafbf4e5c0d1a6813142862434df117d1a8c012d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e83c12994d131e26c3cd1239a11b3836216f0222d03fd730c4cd64e54fc5612c
Commitment
ac2f52621184a024bc69a916b49f607dc35e8ea0fd9a83c546969a5db7378f06
Range Proof
672 bytes (Bulletproof)
Memo
7684d6416a34696333f3504a7114ab173e7624cff56399e9a5920c5adfeb8f4bf4d0e278777dd364aafd20523433299c44d88f681405cbe3e6bf0ce1da7bc18ecd06d55fba008565028b9203d4b0c91424dc54a751d39fc7d59818645fc8140bf0345e907db14f932e5e9bc780597978b4b10a5e8166b71d45649378132096c6 (encrypted)
Stealth Address
ae5248ce4317ce3b88b7c4d5dbf242da9eda4abba6330b367a87209661f15d4d
Commitment
4c95294fea03d19bc27a6b0ec603604187f9c5ce482dfec2757ec458db166f24
Range Proof
672 bytes (Bulletproof)
Memo
921a8d607104e015a4e9feff9e73711ade8ed1ab861d4c4f06f4a507a539cd02ef4097796ab162a489dd4ecfba79e62a2011113c4e077f442242d57fd2d5a74fcc4b4f6ecad88df7bf44c4322ee798d0d178a985f10bb5ddd228375b89ff1339b10220afa9b1565803fa2437f2f6b8c3e3763351097c2a292d3c661ab0b27763 (encrypted)
Stealth Address
5a46f8c5c16a9e7a641d68f14289fd54a9759cbe31c47a8c9015d92b7bb93741
Commitment
c8657412fcfda2507a59493a4aa8c03b8c8b0a94c4614b87529a04238ce1da48
Range Proof
672 bytes (Bulletproof)
Memo
3ce4604351dd4416d86ef2fee81c87a6c5b9a3b6f6ca9731fc5a930bb28eec2c1298b4c2ccc89778c05422be7e8875461e40123debd33ebed2f21542e9f98a2bb722039a6d462396efbe34ea4c80af7aa1ed1ea52471727e22a1eeed20d4af2609f9211d7651fe212b7cfba4276c350514c79d666fd17b49041d02ced7865522 (encrypted)