# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ace192c41a9b37242c53221cd94e6418c8d961833b9d9638933369ce77ee6f63
Pseudo Output
74eb10390d0466a1d738556a68391a48a2bcb4b6581372d3cf516a43f72ce13b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
acda7eaa1f8c455af0f2ffdc5d156dcd3aa583682eff6fefed18df1f31c62353
Commitment
52e30548f8a598a6f1d48f3260bd3b228292f466cbff92385a1711bd2eacd22e
Range Proof
672 bytes (Bulletproof)
Memo
fe4ac2ac049a42a336d25cc2c35c6b41c78a0a2e2626811d6db3eb1c0c83c81c44fe259f1af78156fde1c7d3fcf2d52bf62d57591288697b25b16698ac25c6b0f51b7159baf5a8889b81993c6f9852034268cd64c73dfc5e8dbf3c6b9664dfc2c607bbc38f8c2cbfd7a7ef0c69fceffe905e26dbf9fcc2e8c856c9d130045fd8 (encrypted)
Stealth Address
3ab0b363f811af760b071792f32a953ac31e22e588bc674c7181f8ce80583745
Commitment
f68a1747f03d9386ed7c730bf958c4202639e2578ff27849e5bb4de6bc393c64
Range Proof
672 bytes (Bulletproof)
Memo
7dfd992010ff5902b1355fcbd1f566065a8f433e040b275aa6e75651b023970ec427177d06453e782e3b009e7d9fd986dfcea76945cf7d0de868d00a792d42e88335600d5582a85edeee6efccbae8fa2135b41c115bb5f36a6d4663c1dcb2dce739cf67a1d794e9dbed486a5f1f46bb51f186e0d5e2533443192560e7e14ae30 (encrypted)
Stealth Address
ce264c8dddf1577bf420e52de3d5cc54375c06e8b10386e8ef97d7ff099e4b2b
Commitment
a87e955ca5ac531469580f840814ea52b7c1b2672f78595527da09235ac3761d
Range Proof
672 bytes (Bulletproof)
Memo
0034787ffd6c7c4baf8c906b9a142045303b503daf8c88ba743a65f7950955ef10e29110a911f3da5fd4c851d0d6ec423af7333f46cdfaabd10deee3594e63a6c8db928e013e6d780bbf8bd8c102b338334c1103e6fc0175c5956546e02802a28ef4672f77a3b7bff4ef27d572adc22a5d06c8f1c332199c8761bcd7ace0ce93 (encrypted)