# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c8bc15dff3d85b6e7c944d4473d652ce76d7dc967cec47b06aa48c9d9f40f6f
Pseudo Output
08d61f736896e78f4b5f0663bb4568d3f24fc5964f1326a70380c8d954ea2350
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2c4a0d00c1a3e032e386945233732696d5deba1d9a88e6a619cb7bbe8c36d97b
Commitment
1ad6381b278f1880f0175065e1e75bc0d5fa270474cae84173c67e12f989774b
Range Proof
672 bytes (Bulletproof)
Memo
c59be05761543f4c566e7a7030b98bbad714f6362be229af956d5fda31b6c01539e850f88ee6fab3c1de59dfe04fd0da560b4d3e1ad470de2fe87bd9d76160390cb733966285314763008454668fa67513cb042e550905e2bf94e032bbb0502deea1baff42f20d956721065fd7e0f05e86fb41dd7c63b7ba98e0e75a9ea7e62f (encrypted)
Stealth Address
12d845ac9bced6fbc388566e1327373a272a721fcc19f18c02731a2db95a1617
Commitment
06b8fc0545fcb6aa33169bbf20c2381a8c926154b86bf55928da6e15d8198c4e
Range Proof
672 bytes (Bulletproof)
Memo
e6dad00965861cfdd535d01c4e68b26d143991544a27f0291371482bd939d0ffed61c567b1b7cdfca53f3649315fc81867136935db7df6b477695c3d20e408d8be08040f904655e8964356ac90a22679212b4afa508e451379c6dbe500f755464d4703d6dd48fdd621141ef5cb4e7e2c299f7ce342540477b315934753f0d83d (encrypted)
Stealth Address
1ab2b7a2f060f277ccf2a250bdd41a32edb73d9c73ac2e16b4d4e685b1455467
Commitment
da71035c93a5d7b27503d7a67a089b12689ed22bc9b69006a0b50c66debd5a64
Range Proof
672 bytes (Bulletproof)
Memo
053de7f53f710f1cf4b275f496a7c7cc210789d9c24340719714e87ec36fbc05c26382626552fe7a8fc76e18179d9b6a9e5b306c2698b6a0c544d418e8b57888cfe3236bcd70e18e71321d6e142e9063440cc9a7dc4b1dc5d2a537677c57c290de354472d33c2c98e7d964a81e00d2a22b97c78c10545fe97fade0c9ee0996c3 (encrypted)