# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be55202e21344d8f129048ed5c7dd94bea7edf4648db9d0e39e04ed5388f3d4e
Pseudo Output
3ad5f59679b5d8837934859ce78939e331f2d60bd6741bdf15c9783631cabe7e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1ce799984924bdb61a9a76fb9625d9326355f42304552d276b677a085905a738
Commitment
de8e3c943ab12d08cae95afdc6c1b7ce00aab8589fb0c9094ec4c9fddf88ab44
Range Proof
672 bytes (Bulletproof)
Memo
6643cfa9461d263afa588558b1237b63ce1e9e0dab82f8fa18b4d0b3e1411d132d11f5841aa23a6df1be2653d9d448f4661f76349fee6cd6c5e143e5ce11246dcc0c862a8d2e8ac33594abc1966e029c3d2752c89076ecd3864056a6f893dde295d8995bd6ede734a4bbcd2a0d5bf1438424879ad2ff3eb5059f2e56f3acbadb (encrypted)
Stealth Address
daafc392b166e7af946fc41cbff2295946b019405a19cf908b76aed7fbca8f22
Commitment
aa3479360b1dc98a0e8a729c61638cd813e7deaba662c767db4c06aa7e37c622
Range Proof
672 bytes (Bulletproof)
Memo
ea0245d0e832d8815994db52106c4cb3c5b399580244fe81595143732855d6386001f040e747c31a11f9044173477a5ee4c2dbfcb5a754992a10af3637818a0f6e7ef7a9ddc0adb9cb26d3d2730ccacf28ec3793bdf69cc7b4392f98628802c5a3754f99bb7b610cc810a40f894430c210e4cd667d0a60c0229c3f2e3d0cbf8d (encrypted)
Stealth Address
fa75013095331a47565e1307940220b7a2f61dd5c6e64442129f7b3eb6d28773
Commitment
0012df50af2451c0b8215eeec8773a5f561f6a82cdfb9960567fa6615d682d3c
Range Proof
672 bytes (Bulletproof)
Memo
1ab09ba0cfcb37248588b8cbcbe290686cd59d06c034333f316c65f693238a3949d9d2e1316bcc9fdd8d90841f06cc4551f5edafb1b2728238170fb639ffc410f245075599b8185414cf501700ba2e690ec3b51ca07be6b1437b77519f6fa4fc4b5a682a2256fd6b05fd654233d3dd77d46abb5de8e5da0c721025b81bc3c3f9 (encrypted)