# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ae80bbbdea67770b02177d965bbec7b0a0a19bc045bcdb46706a22d2d0836d22
Pseudo Output
70304ccb0f9f886120715ffdbc32017fa5bf44ef07bb6d7789e6db7415943779
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fec232fbcacb5ffd0cc39b0c49c7db0b062f3b0a0b8d3cb1a6113af8c3b1cf10
Commitment
d016325b79c26e360072181b0628aac99f8334b5dfe64b368810716fce3f1d25
Range Proof
672 bytes (Bulletproof)
Memo
392e834398e73123e268d720ea595d34a2d3e9902e2a4dc48473e2ecc95e21de8d0c12b2ad47a272e8d84ed78d3de2055f56fde9b2ae23d21c506ade5eecee8266a1562be57b39d86d07bf1b11347dece02bb7afc7c382430e4da6275ded68603f1122bb5da52204c385e817f14811f6678a0005e17920b2f62ce2f599de8e3b (encrypted)
Stealth Address
2c9b32e71f879a22f00d12de3df9c5425ad2e2b567e1f854e625148bc0fb1f01
Commitment
46d1a3463f3ef3dd1521b6d7c9131d697445064c468cd6b6003075827e8a4e29
Range Proof
672 bytes (Bulletproof)
Memo
537ffd39e29eb6fc94c544103bc7a7b0683f6a84a003c83785e1cf9a3ef45158b3ff377350529db0ef7e7634b2cf912807b998b2ecb172247fb6931ed73f2b013f639fb900e18c23c15ef72ae7dd79f657a27b9399e53453dbb2141a0feadb72c70162194283da8259c8e426c24b51e6b49d337d2df3ef5395061829b1586da3 (encrypted)
Stealth Address
067137db6d12b78824ed6808ee0700f379f8ff25ae82e47ab55d91917b314040
Commitment
bc2b3b9640c1a50a2518908fd954e238a05e98af185d5d57e3dac6e179e5e309
Range Proof
672 bytes (Bulletproof)
Memo
5c132eb5c427b67085d54ed1cf9ac3f027ebd06425309625fc5868d0a2e5354b55e74ff6408c721bc9aa6792437b822f9eb8664220045202179b9d0ee7ab6171719bb2d2d578e43b5119cd99cca6c59c3dcaa5b6463e624185ab8d77b23a541b100929e2b9a046b801a94a479585726eb7f7403652bc99b11f5c558df19953e4 (encrypted)