# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cc3d4fd92a3d804b601f2a439de51819ca3ad781e8a0ffc43793ab8938228a66
Pseudo Output
98d8f30e1917e6b46fcc3e74542e6baf1e7804a42d9f4ead485d02cd65333453
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
503f5ebd27830ffae3f8724edbc5e5df691998b761b780e8a449f293582bb128
Commitment
2e251919bfd229591486665475ee4ecc1c5fcde30416a4638ce21be0ca23dd04
Range Proof
672 bytes (Bulletproof)
Memo
13667364cc371d952cbf865f26b7d4eb92e2dca36189d0190f24a3bea8739ef498daef3c35bd45ee26452bcae8a196f964a748d18b672533fc4340f4ad086093e488d6bb58db835d9fbc90316e79965b0a6a19b170f580dc784cdc4c45516abdd1ba1a25171bad63cf4dbf417dd9c7119ff55cd5496ba53c819baa9d6c219d15 (encrypted)
Stealth Address
729d9fdf73545f6b0973c7991479a52799151d893c6fc997574297e761524d3d
Commitment
1a084d601409ac7ff3e03476189fddbd53bbb2ce6b84f460f24a3ab4972b856b
Range Proof
672 bytes (Bulletproof)
Memo
1fe6017bee6f2a9e64a92d704651568d775fa2f2b30a21ba13d04f74ee846127fac89764d34af4115459a1a0c133cf94afd9930012108ef633c32a447ec312ceb76e57e20d174100c8fa37e4a1227bdb2fe45ac3cc357437fce62a626bc9ee1d4dea24514f570f42bfabb301f59af5a2c03342e9618fda604e2bac3754e75e85 (encrypted)
Stealth Address
8e2e07c1502fcb13c6353647fd990b79e8f3fd235eb2a849c78181f56c120d30
Commitment
ca628dd7ddf53d34e938384a98725869ecb28347cd878e2183f1fc2c91ce0045
Range Proof
672 bytes (Bulletproof)
Memo
c357c20b5dd578de9e77f3e3e138f9c4e9a8667867a5b86e82a998c3773b41b7a1d2f63bbe76783c719b662e941d52fc8b51d09b5cd9833547f73a510b1d1f062db8115d052d1c631a99ebc3a3eb2d9bda8f118438b1955bffad794ddd9ad7690858ccbf55d56fbeab1a634dbabf87642aa447a8b95bde38b6c7e691c12eb544 (encrypted)