# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec64bda9c39ac64c070a5fad94d55826490e0e1d521264aee7622934ca916548
Pseudo Output
9010b04f678661cbe331ab1fd57a6d9d145ab008146e9c96af80ae47b6dce23d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
00e95ed23eba9cf639e2b43e36e17c8ff543f9f39af876527faf816cea068a23
Commitment
6eb72e4e17ca3e3514c74e614b51d738571da70f18e6a09370275e79ee6bc771
Range Proof
672 bytes (Bulletproof)
Memo
387daeecd3b6d9110ba0d606cf5db23af5e4574750173db76a686a6b252555a471200288d2d61ae5de7cdd30c50d74725464faac52ac1efede8e0be28280813b7cccac56b2db1e79e404864e5136eede7e7028ec93b4641775ea7f6a9633ee3bfac572ba98c5b1aee205ecf1ae25d4bbaa9b8a2e2bb241cb53766c1d98fcd54b (encrypted)
Stealth Address
7a247f8ba4b8518c89d5e13b82101a4ef3a402e2559adac7ed9e1c539b9ad35e
Commitment
be2ea2cd92da7c30e3d17a723fbd79baffaedc03f7348b406f6ebcf8a1df5b07
Range Proof
672 bytes (Bulletproof)
Memo
a7ca40928d364197a962129943630f073b288678c0e3cc4cfabf5b6bc6c1ce72f99ae8988b3edfc9586fef07921f3f859a9575d010cf70b18eadec3527e5ae5c007e55c41a52b0830120c42b71a41b3548c191583c700a1d4305bfbc1fa4d4f8a2753cf32f55b28a04814f2c532acf8f1401de31a479edd59dacc8d251687de6 (encrypted)
Stealth Address
e2464e61fa52f94292c5d92ff64b550a409794074eb40f08f5bfa73806f4bb78
Commitment
ea7c6c91488f37ec6c3b637bf11b5e7316062b9e739c1f76db3e4aea528e6653
Range Proof
672 bytes (Bulletproof)
Memo
171208f0d8ff8d6df5a313e1b13b676113e343201422eecc9cc8bb255680ffbc5b6585dadef5ccd05271672a723b2bc43727d013fcf7d543f603fef2883d89795525cecdc7d4160f07a4b76471fbe18ddbc312bf6f31a50bfe17e123de6b77d106cef3bdb3117885beb2385df3878875c205e2a705f7600bea6f0f209eb349e2 (encrypted)