# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d0b1286e6fce279eaa322448b99bc606caf6b62448f997b0e431f83a7827090c
Pseudo Output
487b9dad1299d67b7a4a782515938bd34ed897db10ec3299314f504dee473b58
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
50d0b403c45d63e7ed9311e10ea42a09585e2cfaa6c692ed611966cd5d7c0771
Commitment
c2b2a1b95e1cb75d46327ac1480236a76673c794101bfd38210bec91f0d1a763
Range Proof
672 bytes (Bulletproof)
Memo
9dbe5f2f66da4c6331221ae2418128840506d15bbc351b400731b6425e5a729907a370138a64fed0249a1dbd4bbcd00b8fd695bc8d8147a1d5f51843a5e09e007b013265871016fc0e35aaf524113d5a7c8f1a95b89e5c92f596b1181915d5686559b3240de9697dc9e4c01a7e1c7b53b845dba965805255395269992b76066d (encrypted)
Stealth Address
38ce852c5ce5f4338e48d059164fa7922ce60270759728abeb0dffd830886434
Commitment
58534ad5762723be454c20a4081fbb6c6dd230ba1c9fb9f8cfc97153f4e01202
Range Proof
672 bytes (Bulletproof)
Memo
51c13c1ac9c35944f07b1ea1c926a9c1421c21697716bb368e4159ee3426ec75c0c44d5711a16e2ef1da7d5bdeb2651a3ae702a21d1c476cbb681f605a36e80c76d846817449ece88730c3c079f7c6530c5daf8f52e29fe7a43405f5dc7b73049934d3bc056e9e0403ce1542ed9af376c0e841b61a0df0d20de0afbe7dc8688e (encrypted)