# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac82c8bf455af993d1ff8004a8d13150561fe146ca9b6ad3da436730845b1c48
Pseudo Output
8e52fd27d306ccc47cabe47175d469060017db43d12cc605095918b559cf9657
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a68102391d402ed05480179a810dbc0cce2199eb988330487033c3717e63a05a
Commitment
12db2ccfe1ea354fb258b88e4debb91b8bd992683b7faaae1401a9eee5e70a1a
Range Proof
672 bytes (Bulletproof)
Memo
df5248dfe1ee0a0a709e46b005f3a27d4ce19df8acb86177e0b082c93a563fdbf8bf0777c50f53b41eb3ca6d802d3b8ad6a8124a377ec983d4f2fdc3c7a369985befb5f56086a32b976ac34287d3441b4b4518b6329fe32b7d5d8f5504d4fb345a51f19dd7fc6cbdf897226e08934f44fa483630ac8bcffdd568d82cbf746234 (encrypted)
Stealth Address
a46182b59f4fee2b2e1420352b5c02510cac4e9459594ea4955f7c3b19af5a1b
Commitment
02eb0d17cba6666b45eb219503aee55b594cec840fe11ebe69dd59f3531eeb48
Range Proof
672 bytes (Bulletproof)
Memo
b35dc236898a97d3a76624537fd0bdd6594bd450f7c88fc4e66d8295a848e63597710be02def2452b180a871d29715be4ad665f63a2a8263281c37e2900c2e58eb81e660bb18a327ce648199d891db9c0b14cc2f1948df71e8df455bf4f70514c3dd30c34b88d98bcda896c111ef95a15bf1fa51fd2e7461e075a274eb275940 (encrypted)
Stealth Address
864145db249c49571aaf92571d9c4837d33527382095d16ed1a5314dee028743
Commitment
a2a577f2b79431394c8e458a8dbb08f2679d449ae06177af1475672331b3e51f
Range Proof
672 bytes (Bulletproof)
Memo
9c25bb8dfe6ad2e1961edef4c6514568f8b3b4789ddeab57114feff42ce028f2b4261b04b6a8a1e4a9e83e3452ec5bc092e7733b7f9810d0c8dac84e6dfa67a13444f00dda0ecc66fa6fb3968833e80e43733c06c3b36171a8a55a1b618c2cb58b9d001dc060b068b6dabf09786a3f01ce199881f629f9ac580e38c4a28324a3 (encrypted)