# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0ac0b17499bbda0d192f660cb76f54b84fdcfee54f56e23d0b3237bea99ab51
Pseudo Output
ba2e1bd59f845221e8734dfbbf3ff22f10129725ac9c8a8e931da19c5e05db1f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9ee3b823ba396fbeb3cf4d5c6f10e1ad018cbab24ef4feda275060526c49f466
Commitment
dcd8e0f60b49c6bca2348f9464dbbff566d9914263c7114fbe1df1effc8e3337
Range Proof
672 bytes (Bulletproof)
Memo
8df473cc150f5e6158f8e04e0b6e99a39dc8669010ef8c985c432b3c355a47dfda34b3d113211149567fee29e9d2248466836d3b82abc4dc5100d1d0e43736c1a5e327e09cee65f7e2a1beffeb0692a40d450e0d8c97b25b78966ac80131f4afced7ea1266688e56db4c4d8dce252ae57d29665a3d35f58bc95dc557d9823f5d (encrypted)
Stealth Address
a02a27869323febc72bc7d2c56c9a44f39312b6fc8cff19fa7e21db509a23e57
Commitment
ee7eb16673c7f2c922ac2989cf968df26aa9784fc038b01740cd51a18e62f206
Range Proof
672 bytes (Bulletproof)
Memo
6e07db444a92427835e2326a3bfa7e3cb4df0c4da807a48fefe6f19305458e40d83ce1b8dcd5a6f807e0c793bace3482a64b5db1c43872e4a53999e6a516f311a1ae8aadd0cf6b46e9dae5911cec1dddd7027d357c68167582c492c527876bc057fa1f3596a4084f42140b62bb25e60fb9f5564255e04803fc67907d00d7967d (encrypted)
Stealth Address
c87968feb4ad6af02ea614724a2770d1d3e74cc8532dcdef298eebb4c0946a73
Commitment
10bd6acb26c4f20173f2a7460024653a7f23c15d978a3ac15684d49553c7614f
Range Proof
672 bytes (Bulletproof)
Memo
2166a733e7b914f697d3408febe7ffc367b1015df049612c9c2c53a5240f4eae1de6ae509845308c4d1f91c1c711795c8660f1b74ee7b763dc7325c94f28a00dd3e39dd92eb847a6fa331fb5b356cec2f7c2d5587d00b5b0a1a247e43a9d58fb2c882f71af8623126bbe0b7ee177382a503408294d3407098fafc79944c5d017 (encrypted)