# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6cc5bee4272dc4a4c54ed305d41a875d8172e56c1550a85a0c7d0f3306c6db4d
Pseudo Output
50905daa53dd128f362c7ee8682ed01882e383739562ff9b00a746b0bfbddf18
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5403242ecd3cd4432b9e4ed2f1f944a2f9651345f4456032a12f27dedbd3dd29
Commitment
1e9261584408c6a9fe124db741445f46def03517572fe19b801321a2e0096756
Range Proof
672 bytes (Bulletproof)
Memo
8ffb9aceaf6dafd9cfc6451b6d13790d9aa3ce9e3a9b30b15b8d58447bb68fb5ead2905b665cce3d22a43c24c98ff893eb6e4f87ab5da0b5d3030f2e8075f9f5fe7ad09b7ed8bda9b4aaa15f1a031715bf66db0702729335b2417ef9c8a3d09d20c5e595f33e10b7b13b4f440afdf7ebbce3ae5300cb6866afb0f36ded6deef6 (encrypted)
Stealth Address
0c54d21bd84ade72fa806e24966d0d06d86b9be7624507d00c8c2ab3536a6850
Commitment
98b553630bf0fe00c91befab7a8dbaad6a839bd21b0b8102eff976304025c21a
Range Proof
672 bytes (Bulletproof)
Memo
f4fe89d4f6c7bd339dee4ba3be88ad81c775b5ee52a9d17ce0fc788fa929a1512d10e034d4e38d28a56c6a9aa749111ff3923d2e470d5d630796174e063fc80e3aa5ae1eb440d876b3c0d28ffc820edd1eb3b36cd1ba4948ee20a00a9f5e342314639061a178735878cc037bc21a0b3494fe18e587ac1dffdf548cb47d5ca558 (encrypted)
Stealth Address
a88f8cc0f8600630184c7a3fb5081a47ff79c7c120b1279a502ba6c56a0e0452
Commitment
0e92aa54ef859218aee98d402710754f4207bdb514a7b9019201f22cb0b20268
Range Proof
672 bytes (Bulletproof)
Memo
c04fb033be9c21929fa576f34fc975047bed2613f3c87527d6ef5d9fc828e7f7654e824c8a34fc2d991aacd00a3e4b0d45680eb7ad4a63f2c0b9c3929588931ac42d8bc88c6c392713afca47706456c9139da7e6626749337dff022121bbc4da176bb87e9ad0e25ba4fa846e43f874846627729aeb4cbd88a7f6fbb83f303ed0 (encrypted)