# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2ad05d8bc178c5db67e2861052afe25d997db5d6624492a5e2354bc0cbc04c56
Pseudo Output
e606d112225e99769cdad834791c058d25b11480bc59ea7bd66e3042cb474925
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
50b9254518cec2cda0cdfaa3eb77d8095a0695f1eb32d95130e5243ac110244e
Commitment
1e05ca20f57021efab77f5f0ab801239665b93902be33463427420824d100452
Range Proof
672 bytes (Bulletproof)
Memo
4111ec55ae68f27ebcc2e2f9cb34da25092844bae6fdcbf326478bd24779b44fa7bd6e583320b700584f6985343978d11d60cb6715620a9d440d40f579479b21a82fa87a1fcc502a7aeeda6fc249670411a2c2210b4f33bfc1d6a94aada72c4b582aceb36f8fd6f7beea978eaca6b9040877525b1d28c81b5826bcaabe55d1f9 (encrypted)
Stealth Address
5023ea1230f5ab5c091e4336b110262a4e0f8fed2f9054521b24d700cef2995f
Commitment
3e007c5ed793c6f10ffe3c98165e1fb734676f400cc513c4e5d0db8d30ff1827
Range Proof
672 bytes (Bulletproof)
Memo
d14c564fb07257511d12b2c275b42d9f367fb9ef9850e6aff787a1327ad7b6d01df30b7563b86c05c182d3dfd533be5401e87f8f1f66495f7f0267212d96bf1b2e1cbde7781672eea7aa3399f1db07883e947992cc95148c18a114eea316da18467df92bac6cdddfa94f1894946d40ef338c6e26ca31224901f9ebe7023cf13b (encrypted)
Stealth Address
b633d72a9ce676c779d93f328911f362ae01bab734f31570f2791aeba7a06042
Commitment
801cb7db0a6a05202674c513a2586ec42de87f8e9c23369df959ecf51091b81f
Range Proof
672 bytes (Bulletproof)
Memo
adbec8cae1d4f75e66fc0f7d01636f8ef03c45510e648ce3b1ac33a14e2ef5449749bc2e85f94b4d8bbea4b203c523197bfb33c64fc7181fccd5f17f52bca462e3a84807b8c4118c9eb75467de29b2f39fba4dcb7e0e4b427f8fde22092f5246d9f31cb91acd8541a97fd36c3f4b9abd03fcbf60cebae426777a3e0db1771145 (encrypted)