# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea422dfbbb36f1db99e03844379836a4e79c779da64c47abd699ac5cc5c9d809
Pseudo Output
246b29427ee756daec27e7b643f4093830c1644d6cd1042a0cb9a69a98c88935
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ced2b50caf27402a18ec6bf965be007a71a9984894520994e5bc9ae12df25e30
Commitment
52816649ef4758a7275d1d05f1befaa65f0f9a3943b0315ba98b7c778c649054
Range Proof
672 bytes (Bulletproof)
Memo
15e1c347eacf92e6c22bf15c02079636c9ed20a8d5eb94b5549a586616f4b4ce71a11c77245249b18eddc07150a298a0bbbc0fe3762f107737e57180cf41ca8edec6f55e6366f2ef23868e1bc69a172f683041ce0c5bf3178614885d297679251f3f144a09deb0c59f3685d4fc3c8debcefba0c5afe76d917a6ced7208912f11 (encrypted)
Stealth Address
1c929d2caaf9a6499e1dfe150cb51c6a09cd8444fea379e5d77693acb829ca39
Commitment
08e3b8510e082fa204860ee9026a014fbc1cef8c1dd92a79e5927a655f22ed42
Range Proof
672 bytes (Bulletproof)
Memo
06ce09686391052814ef14d96b5ecf4b7ed4425df21da7e80bc12e099ac539cfc5b7e0a4dc1d5280afd58450c1c5a70ddc51a851e32531505cb3ff71bd20c61aadaed5c00c8924d8e9b2ca572877f9ec5e084149b5d1ad0d6bc458ee7493a63374ad51b05ba4c169bc81e5c24390d8ced4578a583b6b340a21b0c7c2113524df (encrypted)
Stealth Address
a4e7e36154f2cd8bb637ce02406e295e6c700c44bb9a7261cb57e89ec2a71d62
Commitment
8e42de6bf9dce68cef3ecb29d59a0ace4944ba917cd0de441c6dc61a8d8d671d
Range Proof
672 bytes (Bulletproof)
Memo
dfe86c2df455161ea92a779e44b6eec01b7d5e17f774b0ca826679452a5d9ad66408cdb4af7b80854ddd3515a8f75a598a390c47ba7cf4fa02c4f4a58c4415d0315210ec77fc3d66c683e1688c066591763f9ba8e95cdaf36d6129c910889cc10a28b1fe28120c252d3858d5fa5929794b5e6597cc12ee434efa6e3072a7d352 (encrypted)