# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
14ac7b63a847567ca1560dc3fcc002b7bdf679fa7464661c391cc9b57d71c270
Pseudo Output
0661ad28493a3b7011b935c4c834866b23560ee6167fc68fa18d28a31594ae25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
50752ff1d435eda6977291e96518efbe47c9472a450f105ad0432abe8ed24d07
Commitment
8ef962c2324365aaa7ab955649d7ace277ea8a3d8812b53e030e186594cf001a
Range Proof
672 bytes (Bulletproof)
Memo
fcc35be8f5a5c513ee200fb910b55854e7fc909681011a3bc9482cedea7dc5dd7f40f0adc693c287501c5c871f66af684e7dc9f6ef5ef51f8ce7534d0a0ec8ca411e070c95e71f94411b6b0d3980ec9a319a8ae3f5c285c8e834d1389ea8f3df93f7bc133659d8539d380bca0be2f3cee0e2b5805ba8dc8fd9485d2ddc6e84c7 (encrypted)
Stealth Address
dab53fc60df82d39e27ba8e92d3995018208e4e5440a015b73641b0692439a68
Commitment
4acd559f117f0b00611f557a4588ffd20361503ae1d813e3eb314d8da3e7485e
Range Proof
672 bytes (Bulletproof)
Memo
6864a8efe8a07526cb616acfba0d7ff76a6ddcb30b567d1b793ce2b69b6ac2e4884bc5075647bb07ee1fd13e2820b153a730a83ff4f4969c78e35e943a3950c77e5fa42e68ffeadb2a582f96456ac9327473c89b3e4d949f3e27346234d0ff7a7edd7a73c472108f744e29b51ce817a360c5ddb3b8cd7ef5cb627a53e5217fd1 (encrypted)
Stealth Address
b8a26235baf59ac7d2f09fe63e43932938d420423dda938efddf4e9139f8bf4c
Commitment
505d4be638d6a495d1ed6fdae0d9dad84c36b54292dced8a32d44c3406fd1b22
Range Proof
672 bytes (Bulletproof)
Memo
e49dd829ef7aeef62dd1f97f890a196833321cad7f96e63a575b1b3283b483357b8ee592c8d2dacbf80ebdd808eb13e4fb2e15f09e8cce56f9da1a0649bc00526d9bf11253784863b62b41cc28121502b67c10b9feb9a61ef13e636d6b688781097b5c490a08e5e07eb93f66e0b66ed8f2afa929b1496f43c7ab56bc76b838f3 (encrypted)