# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c507ebedae66755ca7461021bbedcda35c2aad5152bae4060bcfcd351f91e1c
Pseudo Output
b060222a1a302cca16d7d7e8aba11e7b691c8c1ea25ad460cf913dd3fcbed967
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
50bdc9ae78025a95705a221f5c756ff48cdc6de7a6a0dee5f5c0d074c0501459
Commitment
9e519fbd871fee9ff193f7a2d8cc4e01696253a97a89f8ff5518fe242f86ab31
Range Proof
672 bytes (Bulletproof)
Memo
284759046d846fa34d581ccd7235ce3cb02d285e4668313e3723937828e5941f10d8efddd81affcdd00dc2f77a2567fe6d3215eb05dabdd655aac5b995f146ef2af6ef81184bba78fb9f22e23fa808447ec33e29a136e477ad6153120ff44dd32153fc902d8aa7e8ee3fe17f26006b5e23219f702d273227a5eefe70598a7437 (encrypted)
Stealth Address
0cbdb08d83c691ac52249cde0aae24b9b103283c2e7653e9844bebb6f157f51c
Commitment
c2be50c901d9b82873a645bf16700e559c3df31ee66b875c15a1d6e72f62a146
Range Proof
672 bytes (Bulletproof)
Memo
de3f3f07a5e72fb18a8f41e1cfe0b6178178599dd23bb142941143436ef2a1f80c27f89cbb9a9388cd88f7c2c901c936981886099c07c1ab226e70eb5305149f72c4d85511a94d6f5018b3ce1f232f7320d63d4bba8f6fc3c0212e7d9317a536fb0d195d80398b3894f5956f42896f9cf78ccbd09bb58df5880f418979f69c0b (encrypted)
Stealth Address
f6efb7581152b6c86eaba1c4bb166a0bce8422bea2bef347aa579739378a5a49
Commitment
a2f393de3d17297dc87a26132ff74bf6728afa7d2c7061055513e21c09898c04
Range Proof
672 bytes (Bulletproof)
Memo
b71dc565388addd7e7e151e7ddcbf446778cfeae68d1b3a0bb16a8782d9e4da3014088b956e44e9b44cfcac5e73ed1a98d767e1494302cb65ff660760521830d0e7641f83987bdbe9edf51d5d206028ab3add3bbe1df2bfb4e50fb55865d3a46e180f6f4184fd1f1e60be0c8c8dfa44c5eca187c74847bce3b3b04446f20fa29 (encrypted)