# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
70a243400110f7eb9e5ca277049fb392fc89f56309655b782b601abfb3b86b1b
Pseudo Output
20309b09651ff8d5b2f4c12186aa9dc00d4f110cb250be57b7e7502e7c4a3f15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d0b9ca53bd8f5134b6b483f679318b8896a68cc9075d90d5cf2718f023b95736
Commitment
ace84cb2582298e6807c8073f3ae780f0ea06cb8c2f619728c7c0e828c70fc73
Range Proof
672 bytes (Bulletproof)
Memo
d6ece460e8dacd97f63104ca5aa2072e4cebb7b08269a826262b22168bcc44d1dbb41cc08d0a92fba0c95073c1e21e8052b9956487ae3d068bff834bfd277b62117a6996867591c09f773ffd78870805b564232ae0afd5ecd1ade270267f8dfb9ab667f65d7d45ab69b7174dc2953759daff31e679ab13bd43b324ea002fc312 (encrypted)
Stealth Address
4e1e197b4806d8be861db41262de1a0d24d94a5f957a74aa171ca5b127a58c3b
Commitment
e6242cdbd30f70cc8a9a2f0ce0e6b327cc19a191d9947f48ac4b13bb09c8f54c
Range Proof
672 bytes (Bulletproof)
Memo
7e9910f7e40452faff77c6416bbf2e5572aaeea8a8f49b6ae863cb93b2cb178140502bdb1eefd5aba9772b3ba20d77e730723502835247efc98d678e7d21bbcc4176edb713e87adad5dadb3a121b6f37285f38d90cfe8c6e17e8d4e6ef680cb0ea9c6a6f7bbc380d3ad800ff35571966111c4ef9889355fde0668a23c55c3a98 (encrypted)
Stealth Address
06cb6d8ebfc396a30bb9746a487d3a5ac0dca58c25198e4165e9932a38869c67
Commitment
1c252f0bc5cea490a8f9b9764183b99588cc4eda1bf93367350aedd0c0ad7f79
Range Proof
672 bytes (Bulletproof)
Memo
e71b3c5d07d23501a034d0ea805eedfcbd0a8c2d2de5e0dc8bbacafbc63c5ec5922895a5ee06ae1b923566294bcf69ee3faf2c5fe16274cc5304d43b4420ddb4740cd75933b6501a89ef7dc806c64929e3df3628c5feeb6d258bd0a60fcc5b14b76b6042d23648456c33529c139b9febbe41fc2e3157b723a67af4b8b9a2cd8b (encrypted)