# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
767de041e037f320561a6d8a49acab9016b1bf4c9ddc2955b624313ed2e36924
Pseudo Output
caecc90d2a29b12a3acbe9c0d9cb737c9bb2fdfb9b6115c49d443e04c654f57f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
32a51f65d72f39459d6ff8b67132c84b0aa0a1e2da2f2d1419c3028029a97d0e
Commitment
16e46063709ca541a4da298e312b919a972a48e21e730634b05facc74ad34976
Range Proof
672 bytes (Bulletproof)
Memo
1c62d17cebfca98089f9c7503aeb3e795dcf76b02e3f87a932e690bd801a3b5b6d9ac65db27ca9349fa17e78c32f132c2fe50e82fd2da6dc2198db9f97b291f4e4a2673b25b3afc850b7f21ae940f353099a0c5521ab3e2264c8a611eaffc8d2252ec41214231bae2811d46c93b19d2ec34cc98a8e7de012657e1531087c15be (encrypted)
Stealth Address
7634285f40953850c4ec85e266a1c625f8555ae0cf85179415750a8a87293c22
Commitment
206bc282043974a0c56403331206b492182dc531be72eedd1e57e2d1328d9e06
Range Proof
672 bytes (Bulletproof)
Memo
08f64f4e64a3a3d7e67fbbb8a71a35314c6599352958fe579546b647da7a0ae3e034b6cbd7ccd8c47e421978f02d5d437cf351049080bcf2024adbdd80e6b42544e7697372afe982bd0415d49eeecd7843948abf5ddff642910380aa4f9817df9cd8c5e1e132704f0604d6f49ebc6e12dc30024b4d2ba92de8f7bf63a8bba8a0 (encrypted)
Stealth Address
aaf6cf5c6296528fa6ba1abbfd9ba27b93b0b53e8bc1c0868bd05a24f9559908
Commitment
ee85ca4e2d8091d12ca61e9808e547399baba2f240dff184ed31557e2bce364b
Range Proof
672 bytes (Bulletproof)
Memo
6e3f8c6ac16bbfdbe98a10e7d409fd13ce0343ace3f8cdf925c55742233ef85ea174a2d083a6df8a65f477fc7d0981c0b249fed48b2fb6cb9ec39c6a01e8e7f7df3f80a4f161a1727fcd607fd87ba9f06cbafc058f4252d512dd0b044658f92c389ee7a1a7b1cdf838c39890424e360a8c366f66aeac6395d6fcac266a1d8c65 (encrypted)