# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
707d0fc00d68e466941a887b698c2ab5c450560ca874db5dc0f6f204bd9fc929
Pseudo Output
c823e14606a635f9ccf1c518f62e326eb5599ec92d8ef6b57cd5fbaa7eb0e90a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4cd51f01ccf371fd5e42cc065d2e597297db5a8d0e7da744be522cfbc379eb79
Commitment
c0d226fd3f433d3a7cc51d864898aaf481ac2de2ca386862a85e03815eb5bf79
Range Proof
672 bytes (Bulletproof)
Memo
c3a4d7c80dca42215c542383f46711ab15f3811fbce9d715399a2481dbb472a3517dc8379f5e51d3c2085718e0c22189485c11c1135cbfb7310b1cdbf88dcdb4384a43cb9f58aa0dd7cf2975b44f05ed3955dafa862f6c23eee1ed84f49094eae6c5ff21b2bcc0f3cc479070844d237a369d3360dbb11dc5c272c742e9820f5e (encrypted)
Stealth Address
e0951b6cb65b5b79a6d2448ba7c39305d4e8860080f2f378ce50498b3021d60f
Commitment
0ea3e76189c5894e646ec409d530e495e83766aab02e38b5e8fa035fba89407d
Range Proof
672 bytes (Bulletproof)
Memo
6f3430ef44de0bebe68dcd1a06c95a7f625d32d7ecbca27dbf84d1bcca414690d795598a7040746985e99e9032c76481b2bbdf4427a71a1279bf3d27a783abe29a79d4e652accc46b201b0d1d11d04883bff87b7186aead0cf560d852d066dbaec22069db4c81b2c46d27e9af3199e17c01d2fa79b2401703a01c19e4d6da4d9 (encrypted)
Stealth Address
bad6f2c747e82ae268be64e66ba4bf01254b51a8e92413704e8ce6ce8fb4a266
Commitment
fc6e61136be012342b6043b147d458e9d3723f223a536c52a9c04fc5385f7814
Range Proof
672 bytes (Bulletproof)
Memo
86beeb3ed2600727f7e5685f8e7b02f244dc5a96373dff946a48f568f8559a492cd2c1109c6d2a3145e00f98c7faa94be1ac158492bf51af741f7596df4765bcde51194a53f9d7e93d6c6b1b3f619c05054eb3fa6154d260fde8f04294e8707f1cbc8e70922a4c48f4dd5a5e5d87ee39d691ff96faf5c24200b6580cc312cb3f (encrypted)