# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9056e6996114431e6a83920b48935a8d8cd7c2464b079f7cace39747b969280d
Pseudo Output
907e828780f3848194e172b299d1d896e009f2503725584c0cbf99701c635577
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ced505fcf170c325b6121e1f7ba9589fd61c03fee52487338267234ef53f6d20
Commitment
6c468d2bb90476228f9aeef39d756050cdc59fc769dea5f59696453d15a17551
Range Proof
672 bytes (Bulletproof)
Memo
f12d71716199afaa3c76a91d5e81f4aba8a2179482db1ea212ac0ab0755197d29f4bf960ae2e590ff56492cff169627725a4fb9a16bcf0184c432c98df94ec7adfd896a64166c79409a0ba89feb1c221a73e542d6241f477e200eeaa114657824b51e5bb5443f723e916bb255f04e29ba7d5e53ed83c263e5bbfd8c3012e35dd (encrypted)
Stealth Address
a4e35166a45afc68d98e19e5d984b9aa5b2e9cd01af755fce852fd9151d0a96e
Commitment
126a3e240562582e3fed884fae0ddb09b7c9bac9b0333881a4d1dc0891f3570d
Range Proof
672 bytes (Bulletproof)
Memo
b886fec472d86119060cf99680558f657ff366e575e78a0a1f45014f2b79a65ffa0c4f091093838816c1f73773a6427c134d0cc6c6a0bd938ac58a1921630646d06781d5f9ad4befa22b760257b7b004145d57fff38b6775aa397f9ce93d5c54628eb0fc72f81991c9b94308645a878a085d17502ab0bc2010f6098bc11af2ea (encrypted)
Stealth Address
fc82aa8448e39edc1991d24de1c13aaafac154b6d0f6105a39f0b25126570960
Commitment
f63f33a6e71c0777cbfe1b06131be0c4347d6923101530ffe4c096417f044a47
Range Proof
672 bytes (Bulletproof)
Memo
009138b0d3d965e2c712301e96f22c1279e7933dc894f75a6ca04c16dfd60bc2045eba9cc99ca4c66836ba1ec3b0dff5bb28c6f0528cb4401d09783f41b7193073bca4e24f18980ef6d825fff124043ce347ab6ca2dec135931e86880461983e064662f6f1b2c94721e1f6f4b308e40dca11707739b9e63a604efcfa31281abc (encrypted)