# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
64ccd918ba7fee9aeedda6be43d7261384de7e99461c55949dad46c14beaa33b
Pseudo Output
daa4ae32f245bfa61c66d03b2b3a791b5fd9975296f764530fc9ba7b34b2444b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6cf2828584a4a893a18a33b3b9ddf61ab72655b0ccc7653c6de08868847ccd23
Commitment
08f9a4bf6e417482fc6e48b6a8aa1cfe0caca9ed4b1e7060c626ded6ec271708
Range Proof
672 bytes (Bulletproof)
Memo
8e48455b158287d847c7ed7cea5bba28461672c39e05895ead3df9e168d55e76ac89b2c19411a13b88224d315f56edb8f6cd7a3698e5c277f25e865b1516f11116369b50652d95b699a239c8c08d00259ab063d25c0700cb4c5b73c59ac19c48290d58dd918961ddd3b8f104cd9aa754d962435b8f2380d5e0083889fa3f0a34 (encrypted)
Stealth Address
f6e385d40d3875c3d2f410a35499a530859ac9d610287803cae79abf88a6fa11
Commitment
2c2af825af6a7df7d7982516b2acd8851a1edde74f675a67f6e1ee093b3b5165
Range Proof
672 bytes (Bulletproof)
Memo
14d2072877c16fc61c92659826bfca4f8d50a330856ad732847c5f87fe1bc62d770418e769f6ba2e537f83c2973d6f96c62b6abc9e5c0c81aee21e33779368416c7523b5bd017cc1cbbfb3f0d39b6d24d91fe0a3e2918c91485cffb7e9a1522b75f8c17f7e9ea8ca9065d2b51cfecbed2760d0c4c73029e8d510862ab0805b95 (encrypted)
Stealth Address
f0d508394aacfa0988b76b7063b8e30fcd9398981d571d914daf34f0bd171222
Commitment
b2345b40dce5140865d2d8d22754a9019571b1e039f045597430a56b2fbdd00f
Range Proof
672 bytes (Bulletproof)
Memo
bedb4ea04a1782ad36e0479bde29e1088ef67cabe78517e7bff5dfe2ade6cb8aaec75bbf0a25f445dfc00921c800237e1ec7096d9ca8ee39a4b3ffb08effd308b6420755d4617a5b482e566856041b2bd0a69026de14e14227e51670719c5e1c321f576e9973af54bfc4adb7689c8957429371f2832eb243119a80847e4c6492 (encrypted)