# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f6b06250d0c7d4b8863a32311d2eee7aad6540430d5552f6e6d85c1af8c2af67
Pseudo Output
408987092c00d8cf8d8850d2bade746e561ce87e0b69dd5e8be959e29476a207
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c2ebebda34ee10bdb411ae3eb9f334eac0bb2e7bc4e2bc941ff4036455d0fa1a
Commitment
2e0ff34347a25359d811bc007d4e4d0707897246d3c58f8d381110c008aa8446
Range Proof
672 bytes (Bulletproof)
Memo
ff858b4199226480f54146c874794f7a097d95525018faf57f51ee120af2c239198a13ce3d1f20b4142900d46e3d4bbea0dcbfbf294aad65583f02cd6f95c4f533919d9bb485410f13808511dc4af6f80ffca1d0fc36e4878d9d91d30b818a6a51b22a1c250644c23dd7e79e1f6aaf1b30d6b6684a82739843be1dd1ed34be2c (encrypted)
Stealth Address
12b22f90dca329de81117b5de9a47522e2b913ce7e6bf9609ede0b6620996926
Commitment
6e4d6ce565ab6c4edb8cb71b0be5f8bb4ea9cb391c74747ef044ff0ee9e25034
Range Proof
672 bytes (Bulletproof)
Memo
56d478fe62bee4198fc94ca2d94e5bdd044211f2ccd8374c43cf930864a5a12c69a255dd902dd6d2beb21a2e2236002c67c891746020301b7b18e8aedd047ddbd7a5dcbc65febd36d57be18691ac59f11d5a708e033f862e70133b134dcd6f3abbbc2954a8125635b34cbf47f41839ee8051d7eb22981bff8e70a60fc99ae5be (encrypted)
Stealth Address
a620ea54add67bef82f40e87f4efceaf66df51be84776d9917db681a73f4b748
Commitment
6e15fa47da230e9a045b0886c5de59aa6e10f0ee6068a897898e0083aec2327b
Range Proof
672 bytes (Bulletproof)
Memo
d6474fc727bc068c29a2cfe55ec9dd58abf029bcd61560148a3182ed04ec44bd18e2bf934071e993ff2e1d0f1982d5cd8e2123b141897031cfce07ad06cdd52e5febc5496bd5f109dbb6bc7dec45063fb3ce458825a6b89735b6325ae75de7de05da4fbef2a79d00f551ea097dbf8fba26f7fbdaf63d5e294b98a56bf2c0a98e (encrypted)