# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e60065a59f9bfd6ae128de7bb91acc0e33603433c94ac2dc9358506372e7763
Pseudo Output
32460fdafb7e7fe6cab5045894e7674997d67a51b0ce52d79d1c1a117019da23
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aea82b454534cd79fdea307d5d036a7b2c6193a7aea46329115317ef0f7e6a04
Commitment
0ab1db01c8ab617908da18e1ac644551f3115f5d8fb45db12f0313e3afe12a0b
Range Proof
672 bytes (Bulletproof)
Memo
91d9b20a5ffa9536189b90bb41ed669a7c72d6ec805ad02e3aebc213894bcab20d168696406b7a4189935ec63a0619a1d2fff4b114d037decfe40fe67735aa556ea18a5f03c5983b580783e3c0f00636a4df8c0745f50ec6c668593dbd2322d6fdbb28b89d4a8083f44909ad60d692e3f37aed9dbef7cf0d279ecf18dde4583a (encrypted)
Stealth Address
84dc018c5fbf7088f227290432574cdedf7d9b8b434d71fec748690b55b8a736
Commitment
2831b903bf5dd278119779799c1f6d69fd4361215578a7d38e756a771e682b5a
Range Proof
672 bytes (Bulletproof)
Memo
9a0a2ddc6fb60a25ddafca5825066fc884e16e7cd584865821c4a163bb31ef75a747db81b330b6b8654209aec97380616bd3fb29307a96dc5045486a15ceff225f2ede50d8f493c566d2ab8ee225248f40656505d0ee0374d22d2af4b6ee8af648ada3862b1f684b447798fed460bb826b5518e15d029f48c4f97d4be1a85d8f (encrypted)
Stealth Address
a05b1fbf6c24f4a739fbcb2d04b21f33eae2bc7d21c8bc1eabaf58ebb2a5784a
Commitment
a66e532c3c226039475aa35e76e0ea16f498bef4ed23fdf01292c3b3845d5a37
Range Proof
672 bytes (Bulletproof)
Memo
6c53eaa13ff24cfe16d6a00c44cf1daa9e1c3742f29756ab1f24795a6e4fd670e728b9035f30d6c0fae2bb6e2c3d38df3a775b1fbdaa46be456250844305cea2a0564eed1e1dc97cd9cbfade575627768d0b115a1fef147fcd6d4a824fbc646c572bf73c11f0ac467e0866246c2a3e53c8c586eb077eb7c05697cadeb8a3fc8e (encrypted)