# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
24957924f859d78853e61b70ddc05ce0c0b6450f7b9f104e95607da52f6b085c
Pseudo Output
e6bfd7a6cafa49abdeccb46ac685fc89730c074c25b1ee7960c57c244e1b8512
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96929271d6952c802d8e08475500ddf6b07383b56d4a288c1eb84b9b90f7871b
Commitment
54eca8e95002a7e070582bb297a4c03a410b07355e48be45160142199597b35d
Range Proof
672 bytes (Bulletproof)
Memo
c2647b7b9146b71c2028e399c74a24f6d9ed2897d17da71ce52db3f237194d403f0658f871684d618ba359c214cdf93fc007dc05321bef222138de3132f011db3e296cc76eee93b3bc5b9c6419885fd62326e7b44940c7d2e74741ebb5279834c81f320941176f785fb94ebab9cc1a9af302d268000046c79a3dfb98f8b045dd (encrypted)
Stealth Address
841cc8df302f8fc9d2c46cd202dc762318c03ae0d46fcba83d487dc50fd2703a
Commitment
36d50646d6e38a2b0ac2843efa33be3565d1c18b0a488ea9abdbdeebf1e95b59
Range Proof
672 bytes (Bulletproof)
Memo
b049364d4322d134b1d25765c917b2bd4c5e78e5694cfda7ddb7c37b78968d0441195d3613ad695bb823629f51aaaf73ee2f3f8144a5996f3a5584b4c7b03817c5ee978903802d4e1f1576dd3d0fc72a44dfeafd9ce5950d2385b7f7879aee339af70c49f17cc9d92f394811028c1e075fc6e23cb7aa446d8de38f59bbb32271 (encrypted)
Stealth Address
f203be6ddc3930bc20b1ceb554f003590cfb33bc4fda070acf6a31522a579012
Commitment
d0f427e5aedc46f41ee2e7ae1955ef2269ee3b90c22cf2978399651b637df12b
Range Proof
672 bytes (Bulletproof)
Memo
488acd6909b702e2fedbc377d38bc2583310ec3cdf93dbb86e2ec9d1d21e569132ece2b72ebf5ea9c8a20e3576b3f8a76f2b1d6c48a3536fa6291f42ef9a317d07c399362aaebb8d569b62f730ee9e22988eecfb8b5412c62e4ac1462d7a23ff60529631261049676359071b8fd51f842512530fc67f473638f95d2a69e071c0 (encrypted)