# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
50f6d9067a280e049854bc08acc0f7396a36d1eeadba10f9cdd0a8168a48405c
Pseudo Output
5a4c7fb7d453d83014328068b562245ced4d8e1941b4533bd67d69ddc1d1f574
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c6d37f9b7d24021336c2bde90620186a28af1b0a3d79e33e9875cd996e4ba00d
Commitment
321b1a944d3eda47074d4d7d4deb454cbd1d3914b168b488b854c49c9b06330f
Range Proof
672 bytes (Bulletproof)
Memo
8c51d97621881d1db9ea79f870f2cdfadd953c1756d28b8fb6204985ab912b0c59fbfd2df3eacb17899615fd2f671fe0861f72f62ca82433ba01c0fc055a9cbc30b3f5edcd509bbc3192b5ea0f734133ce8d1ac84ed124fb4ae9d79409aaf19ab582a118f4faecf2e4d1487d8436a1bb443871d0952d04aa33be2cdc6c9a4d8e (encrypted)
Stealth Address
4ca18f44665be42e18955155308a07a78e6a0869de50f86464a6a4d177beb344
Commitment
94c93977fe6bbc385edf8c85704c5515799bc15d95ab410615bf69f665e7d770
Range Proof
672 bytes (Bulletproof)
Memo
039f33728430674e712c4f616f491908fa8cbd832006f816d90bafad983644cb4890b01f7f8003ff949063c7ee38599830e43e057a7604356d3ca8cbb44b919037c8cf3af7be5e28651bd3e3a9675e3b09c3e11d405dc71fd0175014035659c56e213b56e8fb251c6ca0cf3cecce3fe531714d5a4c3c92581d5e86168c3df6b6 (encrypted)
Stealth Address
5466fe7b432a53fb0a959532e739713bfead3cc6532dc2b30494e1c1a8c87418
Commitment
528686f8fdc01079dc2357d0e419b2de0c73a457d40bd33f37befa0549d97103
Range Proof
672 bytes (Bulletproof)
Memo
da01d9187aa661c38b066919d200ac44a15a01d947751b794e766d8ef1b46c7a72cc5538a632ed2f9df931863f0a69f298d3fc7ad6805dc35a66d3ae89713976ec78ef2ae94163b202bdc4e62b0bc7a3d1cf0f5f1a7c7bdb8bab5faf8241d931e754f2e53f8a3a42a5af885526bf53012ecb4ce076a815dd57111971fbbd5527 (encrypted)