# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5afb8658864aa9ed0f06cce98a2372261eeb6fdc591998119ee061c8211fe732
Pseudo Output
6ee1fd039bcd595d018f5cf01204a66d144c191724f8c1de72b893a399a73b61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e2e55ca0527d87c887fe2ff52a529799189fffca8e740ddcb725de9d769b9909
Commitment
c21a2af38c13373ead793a2edfb4184edebbc7d495142d20013b01365bd09517
Range Proof
672 bytes (Bulletproof)
Memo
2b313445592a155874acd1be1aa0eae114e1b6c1baee2f447aa08c353f06026b20b1770d444767dd01ac6d3bd984ee6fd3ce1e7174662f3260ea21f59a0caa60d5b8e362a994b78c8a339ffbc02c40cc5a6e4583d074b83cf01c01c9ea9bfd66cab6153637ca4adb851ef233ca45f7ba8c0e04bac319c112dfe93cd727c39ad4 (encrypted)
Stealth Address
7ec76e7233cd935dbd0d932ee0789603632bad00e332450ca410d705ec902c53
Commitment
d859362c1db741edbfbe1c41986d7e9d038bf735ae2de67e8851c6587421d220
Range Proof
672 bytes (Bulletproof)
Memo
76b6ba1a72412b0ac7b760bb5ac87f55f04cdbbb18a001403e97ccb1d4c0e89f8b4d43f373cd9aec0f1222c13bf575defa70bd1d43129a2d5325a18ffe835fd46ed41f20a02e8e24fddf00871f2fe1bfc6e271819dc12ee51ad1407d04a8f0ca06269291bd2b2a7aed038f28395574abfe89929ab844a8d1fd775e4a58331031 (encrypted)
Stealth Address
f08cd84b4c8d29bb0e48f6bdfb7517f15b607169483ab497f0432233423f5d11
Commitment
62d3b98124cc5daddf15273f8b651d062cbd42671a3b8f6a9459ee5ed45dc569
Range Proof
672 bytes (Bulletproof)
Memo
9211e44cbc4e854c852065b1ca7ba848460bb38c564685026842a50d7380abfb8b4fb0f07d4c7dc708a558e54354a50e848b3cb59847f8447aea8e7c9f48c3c2fdea18f4ecf1fa54db54385c20864ab7ba1649a9ec657e4f824d9a688df0504533e5e01ebbd1318a271497d8f337a05427b923a59734cf86d03fe78cbdf6b1a3 (encrypted)