# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0c9a6c99427012d7457882b15cb1a3ad0b15fe2ef36d716a154ef060879bcf34
Pseudo Output
54c0b9d62ab3646b9e75def40c53dba54e91b1a449e3a311c4b7351eb894c36d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e2d8da13acea52ad7a4d29739a59950cb1eb0347ca4d411c1cc9b15eddf55752
Commitment
dee02e72451bda04c1822f0da42fde72abec92f8acf975a53690b0223fecde62
Range Proof
672 bytes (Bulletproof)
Memo
50baa54bc6128762a6cf7a9a02d7a0b51d1bf3c6039266c3b07a28a63968ac83a619456aa8f39166256da10dbff2b47d70643996fe8455b1485cf5b7d37bd9a929b2ce4c6d164eef675d1b19bcbfaec660f2302c1915f6327f887b476e469ab6b61416241daa4689c10ad89f2bc74924fb921843b0c0c2fc8767c02ecb0523b2 (encrypted)
Stealth Address
f224e5e3f5b6355f6221bb9fead28cca7f6690af12714986202b0b198bcd3952
Commitment
a8b61ec41cac911a0b11d3b921a464d574a32868535bd9095a6f64501c417a4d
Range Proof
672 bytes (Bulletproof)
Memo
6f6032feb5067e1ebe93c947a60e4ed129ff3ebac92bb1094b53ed4616a82a86b7173373eadfcacfaf866cb9da5165d59539ccc3eb7112618cab18ca74470780886d2567e95009bf2f5b395dad440f9abb58b69e70960bbde647e3783ffb5f6207ccba8ed3bf3721015758490cd09d65341e31141d7531057f7aa2264669eb0f (encrypted)
Stealth Address
1c22dd7fe886ab17d98e451fe7b0d753875152e8764ec8759b2f64057cb89644
Commitment
529c2b07b934deb0bd964d7c49572fb719bb01742284180d22508c64eed16760
Range Proof
672 bytes (Bulletproof)
Memo
69ca57ff875e60e2d7b617b529b4cc2c33b2282f7ea4e49a1a7e4075fd3e419db516549116abced70ab1551f5a568dcafa07e06eac1b509641c43e256f8fa844d50bdd0f70ffee6f3062836f3dffda660f98753efb289daefad85c1656df52e535157de37e5985aab9915f29039b8fc06144fc2f18ed69604d6a859e9a4f1edf (encrypted)