# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20503396a969676d43a825648062c8a0ee6625bd3baac8079020eba30d68d307
Pseudo Output
7ed0d4cb38745fdf4fb789e59b5d3ca5c693548046f32a5193bd4a1b4f883312
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c80fc6bc58996cfb800432baf4a23e3f1e3c253f9f28d89ee57484bc2bdde200
Commitment
2eb5c2846baf61de70450c1d4eff436bb502531c55357b0c86e6bb9ad26ff968
Range Proof
672 bytes (Bulletproof)
Memo
e217530cf56c4e6d3022cee1b5d5e0d10450187835ca0ceeed9f16dfa68f6e8b63ad8a476e906b65ffa13fc9ca497058cced6b89be0e092c2c944640d0ff497dc900840544ce6d27853d90ce1907a794d83d18627a5ba5aafcaa7f076846f9363fe1b911d55bb09647eb8e3f98ebf390d44c58cbaae7f78a1d9ac0673ddff1d6 (encrypted)
Stealth Address
4ea5b34cdccc20a519b7019860baefd4504117c90048a0d31a8e4830665eba7b
Commitment
f8454a5812fdfe5b101a0967f78beaec1e23d29b50365eaefe802ce6cda7c424
Range Proof
672 bytes (Bulletproof)
Memo
badece826ac25f10f430d563d386e4fd2973a886fab56dfd934b240b7239d6b58ba71f06916da9403f1018f0a8f95e6601338a0c69d637aded28c90592878765f2e5785ab8d3976ad453dd98f753d5eab2002ec679b2737374aa6d2ffe6eae71969d2a17b4c00a29252782427e5009100dd136922d36964c50d31eff85e5e652 (encrypted)
Stealth Address
b6c2c76063f23eed577f8c74ad0dbf9dc17e249df749503607ec4c3fe839d727
Commitment
d0e4cadb8025ac2b80c3e46846b3c7c2e1c8a8d66fe7b4ce3d266ae6ee4c7c11
Range Proof
672 bytes (Bulletproof)
Memo
92e6efa7baef6ab6b9f267b687e805c4ff244bcfa0f70f710438b32af30644a1bbba3f0ea5e35f6c8f57cc2f05a13ac46bf87ccc59c11757a6b9d1ba7c3d8fd8e22c65308f3f53baf6cb4e1bb97f579291127f959204610e1392fe3ed7006502925f8725e7634538f46652c3d558d11de3e2ff93cb6f0bfac7ac1559b1dec85f (encrypted)