# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
50ef00180ab76c343dc53b9a1c0825d8ee467ddb0f42877c4217af8c75f21036
Pseudo Output
72b7f4541f467e0a5c7ccc713ac76194f3d54bdcd237c685e4152f4f13dd3e6e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
76992199ff518714befc17162fbc93794b5c7b93d9609a59609b87dbef6f380a
Commitment
0a5601ec19c00e3d319fb5615321626df28a623d8fe5eed6ba050c5a599bb21b
Range Proof
672 bytes (Bulletproof)
Memo
62dea2302d36520bcc35091de0dc78fb2398dd1e42f5b171b17e20f57a9a9554257d146e852e6a75b4c21b1f093acb883395597b6949a27a5901125fae2d047d166fcec02caed4ec054a8168fc10e05f0a08f9174e27de00bbbe82577a3b5ce821196e0cfb547717a65743012860b0d1218a9f230261c072905ac7694bc8d1ca (encrypted)
Stealth Address
b07b35dd8329d1ccd3801654f27f2a699b81080cffb7f6ceccc3cbaa8d96ea59
Commitment
ae2bdf02c10db7217c58a876681444f478cfdfd5161d3316638e52604222b012
Range Proof
672 bytes (Bulletproof)
Memo
5ed63aad1b2b983a4d79c42dc267cf045427115208fb434371a96e32fc26df6dcce0e7aa3f19b41e9ffb5fd0819b1bf279c2547fa167d88c5ad6ff394b981f728ace8165d8c1cddfc7e861c67712e3bc97c3f606f9127502e0ff8bed42413e72c332b1d33232e25d88a15727a791ae8b63a9804165f515e773176ca3662d4eaf (encrypted)
Stealth Address
4ca105f3fe2c5e1f5280bac38b8705009fd23300c75cf20f9e811072c559b943
Commitment
e470d27b18732c3e0d5f9049976474b3289c31b84b2600ea980bae25a2976266
Range Proof
672 bytes (Bulletproof)
Memo
edfc4d8e0b5cab65748689e2616abba8d3fcc3f9b0c1e35c49a925817edbe44f5d660d0b24c969ee5e5d12995d35adfb3a302de09894cd8ce60e8fa5bd6e94b29c910e95f8df3d64db02569960411131be3dca9c35971a3eb71980adc10f419e53458750f9449837e12c6b6874cb25988613afb01268524d5e4e9340f74da724 (encrypted)