# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a2964108a601a2c11584943bb7e2fcc5ec4da9d53de9cada180586a5f84fc728
Pseudo Output
500ca1d5f73b0deb49b126362736b149206b90e7713a1c546a259cfbeeceda41
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5af50e3c2f33ed1b589f91c73e39e13682b54b26a89d0694b0fec521873d064c
Commitment
3478c31fa9c29585a1bd85823de702cf4e655e118417a1e4aa6522aee53f7504
Range Proof
672 bytes (Bulletproof)
Memo
cc6f982f59964667c55de6dec075d01d2138db5a85cfe2f169d9239213c892fe4d544a224d6c71090ca5f644c37806726e26e75cbbf4aa4d8882bef267bbc6537dcc65c4de53c64a4a3973353b07007753263034a91d92bbd8cb5eb6526309d0c1136324800005fc8e4be98e4d1c49467757285f908c6eece4e8929c967cbbaa (encrypted)
Stealth Address
022852cc94b7438f76ba44926eccff7cbb1e2151ff2864ec41a6947a90b41c6c
Commitment
b6399b48dac69cbf057b054e73215542dcdd4000b689c35866146fb60a320760
Range Proof
672 bytes (Bulletproof)
Memo
538f56018d4a523dbd3c3ca4f1c4ebe62ab0bfa33dac98b245b7ea923bf0e963b0693f00587e6e5e2d1ceede020724f5d468287f3167bfbe3b590f41e9311f75fefd24743ff20fd8d157a12b2180bdd3008750ced3acfc28cec7af2e37f6ef93852b9949058409c8ca8717c540eeabd4b7937b1af52f494e65c4bf964af076db (encrypted)
Stealth Address
1892cc5d4fc02cb3f4f10f88133f224b845643f8b1140d96dff86a084311fa4c
Commitment
828c1ce7c08a25892bdf905a3b7148bb106cb8d109bad0c59f2523d956569337
Range Proof
672 bytes (Bulletproof)
Memo
0ed87e3e073471a5e3b71b1d796910ad4b368f48c9ad227960db79009fb88062b5cd4925e8841ee76f0472b9225b6d69ea4a56172f1299520caf3ebcc68381ef1b5562fe4ef2cbfb6dc3029663d79ec1b41043f8717a0d96aeb652ee468cf227bced3968edbfb9924dd51e61d57796febb504fb9b49b6ec754110bb4cd191441 (encrypted)