# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ece101e80cee015e548dd917f10f1f2efc54599f1f4dd8619e8ed42b7f473967
Pseudo Output
02fb24dd7dd98def43eb6a60e25d92dd4e8ae9bf0be337fb28663d4bd8b86776
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ec5a0115ae32c09f679e6d4c9eed7887b30a4ba22b7e343119c90501bbb1fe70
Commitment
de8d58381113960f3cca5dc9b3d9faf076d41062ed858a5aadfa821e9bb11a69
Range Proof
672 bytes (Bulletproof)
Memo
f6c59f1574da9463633d7d371cbf1deec712d08716fa8757bf849a2ea13d6e21ad30a369f45d554fc4c06430290b6165e1968d9ec60a2f43308a5bc1658a4f0c6ab47c7fe70928fdc4ddb7c00776ac8ddcc94b112c3c3c218ed5266660801ce2e8ba207b6f701b256fc1f77da2ca055c907b91a89ac1cd86557d88dde921b1ed (encrypted)
Stealth Address
f0de0c489a2a1159ddb0c63254e97c00748ac326ef277d303c54995a3be1a40d
Commitment
e83f92c9974515aa1d8719e91260a4ca69d8170301424805f5d110bfc2a9d95d
Range Proof
672 bytes (Bulletproof)
Memo
b0b5a817942d69dd456e2af9bd399406c05e484a35d8436baf0e99e6c582f8fd78197815a23249c9b708fee633a13124ce6567da36ea44bbbd82aa7affa5dc63e42f6a064330a4a6336c0de54481143b04c199cb805998cd33d6f454d52344d763091e85960ad79483b3ff8c99b7b6b2d6d53b5a57961a6c8056ca79c3ff3266 (encrypted)
Stealth Address
94889e0ccb762ca0755ca6fde48f82ea76ad46e2da9ac3739cb5b8c9f9df5a2e
Commitment
8460db2159e909ff9f663fda07e09cced7c3c5e609907c610cfab8bb9532f901
Range Proof
672 bytes (Bulletproof)
Memo
d0fd68ec4602f88be2a7251e4409abfefbfe6a0c5c7f58fa7a58c85e362c14e21c45b6daa9535aa20f7db58c5d3a4d100f33da5bb91e19551f0e70492bf643a215e4289caacffce8e325b82aa8f6e001d68b36d35fd702b3dd9c55b82b9dd3411174c6a4c763bd0ab6acc2a323a19d7d6d71fa280a8c0097ea7a4732b19d4d29 (encrypted)