# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66b653b754a62d8f66bf6ae2146ad8713d8fdb9dd041055f443cb723afb89213
Pseudo Output
46e542f18891b76e07468a6d79fc87f1e4b5ea8c3032afd883780478b962014d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ea59ec550974f84f7414d4b99015869d9fb3eee6737926b2c6bf7eec9b36ca1e
Commitment
3c45ff3f3fd9d3f2a0a518c496d48803d30a1de5c8ba137a029186a004c4766c
Range Proof
672 bytes (Bulletproof)
Memo
52a70142c55233dc7607e6a6f2c89e2eb3e762398c5f15da58803f81b804e08613379c1b080856dbb6a865c50be661218836e4bc40a1e6b09563cb6033a9f07604db2dff1f852e645e9c825aee9c4decdfe569748a0fcc8eb5eb71e6afd88080ebbd16ad475a19d5b3ff14ec977c45acf80ebade3e6869c67675e9662be0a7d1 (encrypted)
Stealth Address
ea6cc8d30f44e5956826970d112e2dd35a4329c3db482c55f3eb16834f64a360
Commitment
c6e817b7e3fc42acc8d8607d7698ccb66309f38d5e409e14018569480ebde11f
Range Proof
672 bytes (Bulletproof)
Memo
7e1e51928db78fd71759d93494aec73801ca6b75939194c4a4d885958cc2a569111e4d83262b8fb4df755d6d233a0a8fac718ea9c5c4e318e0706f2d2cf8610e31ceb1e50637851d77867011497951cdd5865fc33ccbf80f0dd2b973509bb5161c59698880ff58a73408401d9fa979950a182e8608d2cf7982c62c2a750329e8 (encrypted)
Stealth Address
48182fc31eebcd5ed298b7f0c7ef054d13411db26c75ee8e68ab2c1617abc87e
Commitment
e6f09f2fc21b609ba967b2cc7cea3d02dfc2eefb0c94a4d8a1cb2633cffbe014
Range Proof
672 bytes (Bulletproof)
Memo
55922b3b4d1e2ebd58eb62b4bc4e6c57e10a17f3d81d28d53a9d5d4f4a00c9ba93d0f68dace6248bfc6d44f71e81227872c9afc3bc7218acaff77dd01c29d3e314b7aa875e1f12335cdd56c81893f085f474fdffcd1b726ccb32fdb92025dc227d64893de4b8c40e739e8d17e89190b6a7b5e055a69aa5a065da95cedaebda59 (encrypted)