# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
52c018a33a31a52434955226086e3f753ac8bc3f40a13e68f99c88b91c3a7c07
Pseudo Output
ac84247e387caf49cf20408f6889de327b57b113ed3f0a7b3b7e1bbc892b5a38
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce1b2f8ebf3b67803321fbbd0d8714051edef59b177b9a647e6209342ff8407d
Commitment
24cce5ac4518c2d51e1082c33e3b82e799562277ec20328f4e854e4d7b549f11
Range Proof
672 bytes (Bulletproof)
Memo
e8f429c39b0efaf7dc78d3c279107958413424461121d6a2873c21483c89e69ee346bc05a4dc2b3152b5bbd0858dc4a69ada5f63daff794b98c5b310f98cef7b9a107410113ad44f4a68ced76e1ad8768e9e67f148b5568ceb559d28ed9598876a2fcc2b0458390c1d4901e259178bcec7690f362d6762aa09c45f354d1f3c63 (encrypted)
Stealth Address
14a90c272eecb965ff3177ae5779f5af06c26d7d0caacf28e590510769a59d6d
Commitment
861805a8f96bda5c792b782a267c431ad45d100a45b6cb871ed8e147c26edc17
Range Proof
672 bytes (Bulletproof)
Memo
219e8b906e659ab74476eee157a7329b302659c73c8ab5773eb9eda3ed1f447c4d2673dfbe5b1cb3671689c649ce2d1854f1b4c4d299c32a6e58fd3f8c7bbd56cd9d53a2a55e5e89b69f3eeaf0460b669beeea32d2c7e553a34a12f8f477209bc10297a60726718d393ba6e1b845cc85034bcb646c7496cf841cdc76b616257b (encrypted)
Stealth Address
d8cfd50f143628400f4a51268cb811393fd5c8c7a785f35bd128f3b447103247
Commitment
3425408fab762e8b87b6b8ec6ac3c25ec9f4b8b2fe53f8326636c98c0d267116
Range Proof
672 bytes (Bulletproof)
Memo
30ac89a777be3582b9e3185c6c8266768b29e4c2f7f8faa312f0bb716fb3d6b46818bd78a7703f930838eb6c11ab0b0d2c0abde7ff60225a29ebeb8c1415151ce893d51bfa207d839dd1ed81c7f8532a82df33a87e8fc389d304e9ba8b76ee0666784c2ff3c043f8ce8ee7b28bedd0955048454203a0b2d2e6de968d973e4f0d (encrypted)