# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ec228d873d26117f86450001c7ef8444830ec6f08eda904ffa1ddcbdf3a7e55
Pseudo Output
c0415729265b79b7f574691ec474bee6c8648485eeed25a9e8bb790eb5436e54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2e1052ea308651685dd9ecf1f13f6cfed6aa05558378dad3bc46e536687aeb15
Commitment
84d50f80023cc34f8bbaa783251709dcc8a90c9a5b4f89df35d7b6304276f140
Range Proof
672 bytes (Bulletproof)
Memo
c53113e629738d4ad03c1e603fb7d22cd040413580602c4f322a4219f670843f21f3bf8615b1ad4382314eed96419109d7dcb3c79d710294dd9ad64d85ce5bfd23545e2dcb7126443a22c3df69f92613d018ed158c5529612bb62504604ee77b299dc1665db32bfaebc1d201200346c0f71df2577d538996962d3d98267885db (encrypted)
Stealth Address
50cb15e6b8cac6f90ff105d0cc4e4741b547c6f56d5251d818aabd65cf75ba38
Commitment
d8425a1eaebbbb1be6ca11717ea1982cb11772edf945b21551bbf02bbbb13269
Range Proof
672 bytes (Bulletproof)
Memo
def6cfea2055cea178a27941510330d27c3ade2d2ab6f73c3cf4536ffd4a646e2264fab98fbc7c7e13f76b7dc02bf4fdd96f78217a7f2ee6fb16ae0ec35a08f67f7a1c68b4231ba57caa46d5bed03b44f23331a95bf6f508c9e1052ded7cf7123983d26ec1eae6ad72f4df7fc60d0c1145596bbeb36ad3bfb11c18640f868951 (encrypted)
Stealth Address
c8a83328710be1d349800a434fb1806caee75ff1f9a75bd40623df5ad1ee2f2d
Commitment
be8c51e9f3da4db79075fca57309aef37373fe5cb71385493c962d54aff06b7b
Range Proof
672 bytes (Bulletproof)
Memo
d843a629474aa9d21a9c3d95010246c0a6bbccd0d0d33c958cc91acf366678fe948a1dac101cb22fa3b56dc64921bd3fb1a4985c50f236ff79c86115ce8ab574da30dcdcbd8c30f72568138b552342eb6a0ec1406addeeb3f9d13cf5a7eb4d98cf529fa318431e49cbdf7c3ed26947def81edb9758911432de0e100ce2dd9c39 (encrypted)