# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
904ebe82afc4afcfbce50943766526503e3cd62fd74e12abf3484f045e4ef522
Pseudo Output
92ba8e3022a69f9a4093561c1c14580bc0462a7d232d139233ea17e78330f16d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cc5bb5e00853bba69436e087be5e78310cdc30b8ef764763b84dcc814228421d
Commitment
2c2824aad7b980f8dfc0e62814513e654c27f84dde70c35259b217d78862c761
Range Proof
672 bytes (Bulletproof)
Memo
ece92bc16f1228dee15b5a2c75ee42ab8f8e9cb70286e9af0d7080c142091a7e8826f1aaf2361e43c06e157ffa2cbb3a42c2e00c6f31fb8baa81335498157a545ec26c6dad7c95a4aaa44b1d242110c95c9ca1aa5b48b9a2390e670c4ac7cc82423d170dd0b6d46d725409988f8e0f20bd4b5eba621b7a55e6ba525e9806cda0 (encrypted)
Stealth Address
beeda5011c0e033e749295eef057ce3d10412366a688447ade2bfa6289b03552
Commitment
a81ed0e909299b94e8246f0ff9b9080acff42d864b4a6d1e529368cdf7f6de60
Range Proof
672 bytes (Bulletproof)
Memo
d34f884269f9a3029a68145ecf52760c7334310ddad8e5dd9d995e8f92c321c4d8d64b2fd344a8bffd34b1ac9bb20e3dc8078091ef5ae61cebba500695f4c67080f50fb69ca6a445017276e331fd9ce201e9ffefac6254754c81bd36cd54c68f96c5bddb92a47925cf3b3c26bb4d00269bbd3f11e187c70f9721b4bf4ea028b1 (encrypted)