# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dc2f499ee1409691c39728fa19e63d90dd7683cc90b251153289c786f287d123
Pseudo Output
6a7e9b4f0f5b5b7aaa1bab60439701f3ff79842b6953c8f12e94c122c3e69c03
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12648ab19cab6c00ff9065af6193b955be79dfd71ed3afdab619e445b4f2bc67
Commitment
e2b86fcc1c897680621241d80478359c0f071daf8461ac27c8b825f2854ad81e
Range Proof
672 bytes (Bulletproof)
Memo
a014d3dd42a5920ada06d5d0f845a545faa37917b8f2b0f4334e8beaabcf74280b4ce61b4a84bf95951fc49dd96356794e0c4644cfe78382b1223a8f618cc7fd35912f6e48fe7338927149ca8bd415ff34de2db9e0410e674f0b08fd141c07b39e392989629061707fc51425d853542df425cb597329f9cd5edb387e2995ff2f (encrypted)
Stealth Address
50a5bbb2257a61c144fcce57564d4b62de442cf0175b7ae84656b36feecada59
Commitment
76e5c111b520a3787a58fce5c267ca40626af0627d7ee8fa0b2040daa2fb964c
Range Proof
672 bytes (Bulletproof)
Memo
a08c85744c444fc632b6038424424965a95a920138ce120e83b3c51044eb215ca138596c6328bb3ef97a4b847f2eaff5e460402db926b2e73e1e014f5862da3333ce2946fefa463612014ecbb6e621c0e3b541e6257ba105e229bd933e032cbc9bc139bf28346fbe602a328db03ddfe6b2f9e5a3e6db1229e1b9fd30c30577f4 (encrypted)
Stealth Address
88dc56078b8c3b95701dfa58f3c66a39c12aee6b2f6b9eb847807306c1b89614
Commitment
7ae83eb8c480218c1fdb192c4c1c6f23bc34f369b2824d63aab0253a33928a23
Range Proof
672 bytes (Bulletproof)
Memo
8287982b6bb6e9c11ca0651807e184a4aca682c1a50575a1d6025f484c4508eb0b2b63fec0840f9bed8f17151bd07798f6f8102f65f8d9dfe892cd0b986d963913f77a78758a15663efcc13ac4ef44c08edda87b27a4554081bad2f20483a7134f4266226932bce597c01423fb3f4d9bc0b0deacf7809710e31acde2e0539cbf (encrypted)