# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00e654f5e1eb4902c31451473da086fe1149f5b8f704d4348c60e8c1d8f7ee7b
Pseudo Output
368d9a83b70a32e96d3a2c61feb8c2cce399198a93b787fdaa38de9d31064b25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ac1ccc72fb769868ad1b2e34a44b0d44c94c5cf4b415bc1f425404bad74c234e
Commitment
940644b936e5c9e73e80b605d46a84df165370f93fd5211f3f45cc495a54e81c
Range Proof
672 bytes (Bulletproof)
Memo
742c0992bcc99797db1cf609efbb1c8c3f03fb87b3591da15c51047dad79d5b6553df8f23223dba0bc3dad5d1e7d53fd49456a080940503270016843dfd407a402e33f9b14dbacef8079cef122175cf1b1acb792ba70157d8e44e8bb385c1a86eaa4291555764d122ec3eaec716971d834bc41c0a676892743894042be78dd65 (encrypted)
Stealth Address
72b2808bd263213858b12b2a91b0e8b4f72b1c8473d25d4070d1a03b576a691f
Commitment
d2a2abcc5a5c3980cac8470952e459b6ae13a41a1d04c84afcd5a3969547076d
Range Proof
672 bytes (Bulletproof)
Memo
5966e19c9c5600376226b9031832badf642a4c790acd093275c78835e7a1d42c8295af0220fdd5f2d2d6750f0821a7626695446df369c9704cbb6e0730f58a0c8aa2b5f8492fbd4c3b3579d0c735aef7c4aeebe8246b96cace64f3da0cabca9ecd8fddf465e655c1c8c47c5a1904c6a6b7b43654ed5e97de1027229bc004c6ab (encrypted)
Stealth Address
5a3e329e774f3900e0f7e7c0a0c334838888d5912eef3e7619aae5b90bb93441
Commitment
9ec35e56a11fc92f4bf7485271d16fafec2d56ae804f052856fceb01936ff471
Range Proof
672 bytes (Bulletproof)
Memo
5a060607db1b27ffae6fac1c7a8fa8a95d0750b7669b53cf4358a50158047556acf113e87b55761058b4dbbab03552270d0efea11012e670a99cbcf6e30f0d2a0aeb49d8f37625e90d7b14dc4d86385ddf3efadddf07f07961adc7a09bfdf950ae280df120e6451b2a5cd44264b4edc1e4cd10b09ebd681c1dbc6dba9537a35c (encrypted)