# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d80739557dce2864122db0f24dccb7a97dc7c6c6a1c3db5c5f60f24ab1fac72b
Pseudo Output
b2cb1a587f5c38addacd0eafbc2273ed2795592eba9e1bcbd224fdb721028c1b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94494e244c5cc1066c9ccdf434db675a07f8c746549a9ad9ea6fc7140f6b1219
Commitment
34f02c94ce32cac1a6c4eba9651a3b478d741de82fa28f253423c15a820e197e
Range Proof
672 bytes (Bulletproof)
Memo
cbecda550852c7d37f4613e8388189b56aa6d518536003f25a146e1452a63b9b2bd5184af3a02aa8ae6b01e934f3d4452c4098b8802845de32b6b26a03131bea3050719059a895ac8ce6f8384487699bed2760147776ae72502ee77871098708ca267e5a96b4b4c6898fa652cbe1d47178e20c56ec2bb55c1b5fbefae96c346b (encrypted)
Stealth Address
1e8c813551472a69163a48b020ea1ebf4a7c45bd4b521ece920abd8c560a880d
Commitment
8089bcc85971f5b0b3599e86816fe8cb489318f7d14a88a32b6d39e51f0b2b4d
Range Proof
672 bytes (Bulletproof)
Memo
432c619190b2a6e328b13c11a43bc56b42239afc96acc71ee5d839d00e53957a1445a016ab5666cdf2a795fb28210513be8408507d81da1d8c99218bc8d8795d0e997fb5e23638346f47281821872876b54c6791b1d1c38855cc7b18079f44eaeb69ff48089c3c4de51f503929b57ecf8ff64c32ab3f8968ce4ff25ea3b93a1d (encrypted)
Stealth Address
a87b203890325c302372afdc94c8aa70e349c8f3c384bf5e9c9b9858d099f050
Commitment
3012002c052e909e44cf2bacb2fc06f4cf9a283b4b7c37c83e331b3c08c0dd1d
Range Proof
672 bytes (Bulletproof)
Memo
0cfffbaffa36f357d67f77de272eabbe1b35bd4542c0d0b1d0689e366eda8b1cdfc9f3c9c293d34d46e355be3806547c757b3e170af12bf9f4c4915d555176f7e274eeb8df51b7f9665235ca6b5a0cad0fca5d1ccb468b3743204fa8f6191ff46d6c6f43937ad59dbd1c5abc20e6cc8f968352f7ac55d6eb0194b62dbc7f2206 (encrypted)