# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c255ec249385b340bf9b719ab8eb1585205299e469a21bf676326db5eb7b0f39
Pseudo Output
48e927249e246c6799212398b46b0b4fc53950969d32b16aa8767f43f2612967
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7c11d88fd888dd5fcf8a86f7dd2b60e38aa36cb0ec776750ed9a569abce81262
Commitment
0e135b849a13e97f04a8efe913972cb6e1e49ab9dee0d52d78717ff1c5690131
Range Proof
672 bytes (Bulletproof)
Memo
7a1cd91ca01236c45942ba77326e4e65c438fb6877fe667580ad91e700fa1858e6feb20220a07594d8c0848553a76fbc300ba1443f4080c34508a2a36feef98e4649692d5c08f8fee37baed802da23f075b4e766bc41707d26282e15a36d818c16821b33856e6391cc23ea25fb375542f611f9f0ff50f0aabae2926e5b2a213c (encrypted)
Stealth Address
945617df8e1ec79b17fa4d5ca27ebb89198c62202e91300110cde6730f207c2e
Commitment
cab62b3e94dd7f38303787ed508df42a7b02416c67a2ed162b1f3dc97d60ae0b
Range Proof
672 bytes (Bulletproof)
Memo
b28a67025d7ed90b45d6afbbb84a7c05aa8798ac902e0208a6dae111de64bbe508865df98ac492665d2f8ed29b4e96151075a5d9c02e92f482881eaa80f5d918e4249f1aefa0934b778bc063db2af2e10d6cd95fe79deda57b9a3887fb5e49f7d6cd4fefb4a8f32a078fcc99d728c06604b5b3664ddc5771a8b700104ed71b78 (encrypted)
Stealth Address
b0340b291d26262ff6025190d8c06ba48e3e5f81c0a8e194e20e41c889602140
Commitment
7ad037e9858a872d59354e02a471604f1fcfa583eaf9364a5265565c35124069
Range Proof
672 bytes (Bulletproof)
Memo
cfc5df305a371aa13b99c48935eb603c56b43a74a747e1c0e33f41829325d0b30f2241a635e0e7952791cef1642b439c8acca62126d6dba473cc6c67d4acf3a7fc9f67bf91ff56c4faf156d0010895e2281238e0f22705e5a1787b3a7a15f662a8e75d822a6c9b6233470a6f14eb3e913879d735b4f624a96157515c231f0dcb (encrypted)