# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1eb3234691b79c3168fb471f30d52b487a56c284b2319ed248b56fc3f08b443b
Pseudo Output
1c5c750d84550232b7bc22f158f8ad2a9934b8d98fd6c82dd779469bb9df0916
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b045e50812a696c652b2afb85c48eb1dcadafb13267ba104d152b1a276bd8744
Commitment
e6a36e90ced09e0c59d9874f6d35c998ed02a4cc6412f5db3a3a32959ab93a65
Range Proof
672 bytes (Bulletproof)
Memo
5287809786979bcab2579965898a3bc2ae9967dfb4a7d852bcc331605242ded7dd418736d6a9be1a2d033770f80ff97e1030d5c9428d32ab4f30c657954b19f64079eaac5722514914da36bb461e5762c72c87099524173cd1955893d89cd7cde59a27e47b65b86a4309937734926b801f204a684b5e6e0779cf4f7545def883 (encrypted)
Stealth Address
7c70719915390f9b65060bb0bfd2f14f1ae14bc028b504c02ba110a1011f2163
Commitment
50d73e89b3397c3e3d4c538fcccf9fac54b5230f03de8564ecb46c9d0beccb57
Range Proof
672 bytes (Bulletproof)
Memo
8bbd83bd4857c8df90c1342f0e9226d374b6d49d843cb5ae39ba31de3742e4c6c84e039b11f48e8ddf87d5dc975a0a7fa04b1589d962d32383bfe38c0b7f9d4c6a09d2063c390c16c49c62d1b4bef0b4cdbb8a144037ccd97aaf3680d7760cff5c1f5cbf0f769c586d277d478482edc6a8b7d01f2af093714cc07533ff85a891 (encrypted)
Stealth Address
aab7bba2d48f8429eb53718e2c307ae42fafbee5291808d5d69e11d04769720f
Commitment
aefce60619d8705317a42dd8d858ee1a8af450186cf608ac24ec84e653681150
Range Proof
672 bytes (Bulletproof)
Memo
3bc3d56469806ffaf9f2010e25434d604d03d541fa24e8476aec4b05cc5cfcaa324e2cd6ec3c82a38976369c2ae789bfbf59622315c1dc6eb78f7e2e68e2d06dc0d431b1b87be43bd5d931c941e7e8d1f3e6218be1dbbe5369db206b38cf101376690246338bd7eba9f045b0b89db7cb7a01563a7fdf4435517429c130c153c8 (encrypted)