# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
420c3c931849bcae617c5fd1b1304f3d2c72abbb900a892a6ad0365bb39e3901
Pseudo Output
e085806d858040e8086c85504724903e732d7a60346bda0d6f622cb6de11594e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2589f54fc790c73e6fc1e1258a840a85612b9db5458d45c1032e1432017ca68
Commitment
50751e6b5dfe6904e05001e9db83cb6160b7df13b27b9bde282d14b4b7fadc76
Range Proof
672 bytes (Bulletproof)
Memo
ba16ab7a462dc5f6afb7d873c25e5dcb0bcd5309d60ea193e127a8b86461dc042aa35ac1073e9220f566b011f325c5057cb38a4f6aa651aee73d00b3bad3857081526ad88e353f6d6ce2aa537f71520b1e40d88e3e558468ca8fe531f709d2b024fb0064e5573bab58b72f1ac055f03093c23d69dad5eb99867d3263e135a1e4 (encrypted)
Stealth Address
bad51a82da52c37fb588362d52d34e6870ba8fdd0b2cdff7859224243254930a
Commitment
6a0f1807a47b5ed75f4024a72bc9a7ea3b95434e530ea8b0883e9e31d05e8d0d
Range Proof
672 bytes (Bulletproof)
Memo
f0cf6b625f097ad500458033355e708984f0affa514f5045a2f3b484da92141835a2d3395da946f360bdfdcf03ac16616d590ec7ad661f65857c582b9c4c5f4fd9722b37b8d8924776e4d5d1d7aa5fb2915eadb246cdf237d0818b03508642e4c59ca327ac6333638db7c4561e398561e812533e67addf7d4fa1fbc6e3e4e6a6 (encrypted)
Stealth Address
bc2bf9582a28e8cd667e75276e09c340a8206aac937fa14b7eb360ab88f9623a
Commitment
2422f3e39f6f609471901a731881d9fb9ec31a891cdf9b0a8eef97594506657f
Range Proof
672 bytes (Bulletproof)
Memo
030ae5df9c22c40de5d38b71af791b91df05ddba9b52b405ecce69da959d82889de9324b26d9a3e2e21fd34f2ff9b6e4774828c2280ae23a9b3fa0e9025f9af0ea15ae5996ceaf55c163dc7cd0c7f18b99e33464d247a3c608a6d9b00f1482a313544b934922fbb7c99443cfd344f2f34c198caf11230923fcd1c0ca5d447e02 (encrypted)