# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e05d0119531d8f6fef72513aaa601568fdc7590a3cb2fd63ce69c2fda4c72f7d
Pseudo Output
5055658386cbea0806f1513ffb71f5c377ca6175804664f6ded07655e7827171
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
62a37e0a9ce7c59d429e37995de2f0328d1cd808198ec841a1ac6a95a012fe76
Commitment
6007ab74e294368564c62aa1890cdb86e0c460fc2de39d477c1e962527646228
Range Proof
672 bytes (Bulletproof)
Memo
cacd59498c01dc1e07278d7a3392c68450995a957145ddd6195ff111e9cd349731a6efb0f9d26c34c25373b91efc8ed994fd272d043f8c1f3b5a727be2812e02808570a90dc6833c1d05fa1012eb4e77ee662934454c07ff1a8b1916a0ccbe1e3847d9d546bba857492eb7026e29edd5b5d0f5616b6f4bcff9c1704e7ffefb6a (encrypted)
Stealth Address
2e1d0b04a59aa2ff8c42d0b72f5eef4d02cf6f7591b01cf2da1942d936fa3445
Commitment
6a07184c9831d798f443cf5b2b39f349c54b8f73d0b6480a5d8baf8643c8b833
Range Proof
672 bytes (Bulletproof)
Memo
7719148dfd078696ae8e82304365ecc3db0457c917ea0634812e3bbd4bca6ff371a17070e801f63d1381777859a31e76ad1d9f977ff4a31abf18df49e59af893bc5e0639766b2b6a7cd7f07079afd74acf4b8287cedddae8468e5715fe1d75dda441ca39254bae14d95290aebd024aa22c40617ac54a7e1bc99f19785a0c8846 (encrypted)
Stealth Address
b41e3e00fc0c51a7b3948588c2cef3107779664b2a5d96da1689faca62939777
Commitment
100b210c96d59bf435c72a716155286debbe7e82ec7b1e8b5a7a0c04ac545b6a
Range Proof
672 bytes (Bulletproof)
Memo
ea58721bac9308299b553b9e26fc8d07da1483b8799969a8c4837a893106c9d0ebc847dcb8abee664b54b4d3ca99379904bc315aa5d9eada2b87ea91a0e0af760de638460c865d63186f6236044f8f154e6203c905b6287f0ed8aa4d18cf1ab8ed086101537f8f4cb43739ba65ae5c9c5533020c0f3ec9a828a03a090d2d78e4 (encrypted)