# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ca81d606ce7e4a9364ca41c15d5c05862a5d38f062c361c3d07003edf0fc4b77
Pseudo Output
cc0d87db5a8894d550539164ac104ee305bc47fb7c832e97ab21c8cdcd2b8a56
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
020b50fe4e4f177e30fd613455fa6fb3ba42fb94d2139a05035ceb5ed5bee221
Commitment
e4fb2b23ae1d906750ada98fbeaf8a65bb720bf80300e3a636669f85505f0251
Range Proof
672 bytes (Bulletproof)
Memo
ac2cda0bdb38116178d9ab6e367866cf4a90a98137d30f4ebe36e138ae9efa5ad6ef95efc04d63047d8b70bdb658a477245a894f3e9af838854146cb48a0beb381f90920a48936be29a145068968f16238c51b0457c03228c32841e4d372f5b9c4fc84bd907649e3029d291865d5f536ba139677865240b0e9d5ce615c54d800 (encrypted)
Stealth Address
5e9cd7849149eb61c7ec8aac417284f7ed6447562b3ec1275414e954870eb129
Commitment
3071606d28378f806200e671b324dfca688f12d14d1cfece8749b328e697b525
Range Proof
672 bytes (Bulletproof)
Memo
d58fe52aa756a46e31157daeabde10327e64ba5fc778e96d0c0fe829df0a11390fb3fb0e162bdb0db23521232ced839578c02bd8190af3c0c9bb4df8f675a30cc915ef1a8556e0dd4a98e1cf72f6797a5beeaa7947a777299e0bbcada5c35161c8f0c0c5cb8d0d6b587082afdf903caee23a1dd276a31a7267454f10d2736340 (encrypted)
Stealth Address
009e18a44a767acaf6820300090ba6d5850d559544be58dd6960b8b9bcb6fe71
Commitment
729d216c775389e05a2d0a50acec5ca82ac61fa23a00dbec20d3048df0023c5c
Range Proof
672 bytes (Bulletproof)
Memo
f07513eb35f1975ebe1f727f5496039c6b33641711471b275a211e3506d615e9c56fac0b1861648d5fd1a86a8cf707b12888bbbae623683d7f08944daf31dacbda65b6feb08a4b811714e4d7f0bd190e6e3ec6d254948b21f0c535e85a6498c05bb4e631d44a96a8c0ca1b60fd7916a10496b3f6c75e4f9923fd5af9118e431a (encrypted)