# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
50c1bd0eb5a59d718e40c62f2dfa5bb311dfec55f4bc9cd3ce8ae9038a32cf44
Pseudo Output
6226e50d2de340cb5d45d4b63fece15bfe8c2bccda35ff08738285b4f32c0254
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e97a590b69686761299ef8596d0008db2c644789985fcaff383038252e1cf04
Commitment
2269cf59522378a81ec8b6614767ba18ae92be72e8e3aeae252a865afa466a16
Range Proof
672 bytes (Bulletproof)
Memo
897cde5cf5c6bfc282f2f92b3ec094b3ef372f5045d51f2783409e9212937af29c966cd7a54455e088da012dcacf2c46f1ee828f48b567305e1ed902a8a94d7647fc1aa19d712f49a8f5e16bf32a2316cf1770863be797e4daa663fd182ce259b3127c40e3b67bc0f54292723c7b599a46768f14e38b48841cd66353f17fb26a (encrypted)
Stealth Address
06c54667926b6f94c03f4f3bd151da8b7e8378f39b00c718f4e3e09e9538883e
Commitment
9a21a76589798ca37a3ff849602158bb9d807f72a7267a9f6fed075a1e62e818
Range Proof
672 bytes (Bulletproof)
Memo
49499b7a21aadf2ecee1bfce3172ffe71a2a12eaae127cd3c50563596691f579a4626a04c480742a2f4ffacb359a599b5965c7a1eb48ad134a788fbd777880d050ac7860c3dd162231c42b091d8377161cb6c56ae17e3c399849c34067cf7b07f1d77dd4adfffbe7d985b0be1e79dd292decfb11f4fe944e0ceba19217ef93e0 (encrypted)
Stealth Address
326d3156a96984396d8ccbe0d4b8e524ab4197633d358d7bc3edb23d7996e54e
Commitment
3a3673178e273fa68efc15ea1dc9354eb8cdf91b310837b42d761fda36486059
Range Proof
672 bytes (Bulletproof)
Memo
9fdbc0d3701a18c37629c3a72d451c2038f1e8a82ce192487f49b61760ac4fcfab408023ed79e39eca6da8bf537460bcc49d58549caad3fc323a29c156c36864ceef0596cd27b071cef9c5da3c987e698e57589d620aa873d715baa0ef3445fada3f7a13ce37412d43b95b718e4b962d084d92926c28064593b8ecd0df36df85 (encrypted)