# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e28df223e1da50b8541af7c0f7da45111a0dc167c4355f547453f73ca416c176
Pseudo Output
66014b96c3115d2cf0aead5966cd7a961d9162da53d4f43ba87767b1f396704b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4ee5733ad249baf7d8b3f81058032908c7b59b60c1fa364d7913a185056fd040
Commitment
506a6cc1a858418c1e2ca75f9037647b492c989b6100d41118a0291ec7dfc657
Range Proof
672 bytes (Bulletproof)
Memo
dd46c106678f930594904e6daee451e7a1fac4bee4477fbd89902c4f65436b8c3e90b7646eeb9b11e99b95f1f585db79be300567e9324c07872ded4b5aaf855b7ffcca0016a6e322319aa35000229b408c2481d91f79e67b402a91e631e792ccc2ad437fbb80a11a3f1078d4c9a9f9e179f1e1f27308185c17a94a5c2d5af448 (encrypted)
Stealth Address
16a4c308378ea1201815dc8aa2276d168ea03de94233c941daa6294d3d3a6b65
Commitment
06d24f252a6a64ca0320805495b9a0da34a5e5dbc999ead731f702dc17968657
Range Proof
672 bytes (Bulletproof)
Memo
ed18f93057eab12a41fc9cc0a40aff2191c024c64511271265a9c14a9b205f4b332450861ee8bc3cd9b03416ea35650bcfd010f08bbbb6d1a1b6180fbfe7a968f86f5595c1ba746a90fd69e2cb426b21efd00e3bf458139cb993ceb1f163a2f9192e7bfed596b3181e967a010e375ff01863f7d25ded85fbb9686086daee4c81 (encrypted)
Stealth Address
7cea43900924052114a217df91fabdce10b8f4b2a04b173a86b6d2473f4a833d
Commitment
c247c1a17ebd9c062c44697862c263fd4be3997111a999580f7acf1da6c5506c
Range Proof
672 bytes (Bulletproof)
Memo
a565e42a0465986cdc2d5be58abace369d10dd6ec23b554bf73014801b454c8db38fd90c2a771913d49d06a40404d1aead5dd39d12138665329dc7563de75514742a876bff31d7383d0580a6747f9f62f0e58a63277ad658e0523de8c4eb833f879396d137a6d4793fb72965b28446e06c26544f8e70308e67c4e378f5fdc2f9 (encrypted)