# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a054a2e7cfa50ca993bedd16a351fb0b80d6c3f937a1bf0f6e6cd2ffe1376728
Pseudo Output
e851d10ab9ca93ea43a31d19243e9e19565ed181ffd5cdf02c9768ce87b13e53
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0cc7954724c5dd9eba060766d695592560ac242da43283d24dbd87201da9be3a
Commitment
047467adf4ac78ed5b4e72e49e4f565ceebd365a8cca28d1ab2b199b5e17ef28
Range Proof
672 bytes (Bulletproof)
Memo
af15b1e15397890304752e57597c6a9604f8f2f520b6ffbd4160a0d311e2f030a153537d6092856b2037e6ee2b5221ec7f3dd269148ed8d2acf3adfb25939602f17ca022eefa1302a961cc55724cc034cf020a0f4df8420cd268b8fca4cc08447bee8e5203e124529e3238f840d3921e828238b332b4e63e6ea0c90faba01bd0 (encrypted)
Stealth Address
c65dfb4fa7e89b4429c8e5f7c679080190fa06bd22849e1e58a52ada10546630
Commitment
b2ed36c9fe44917f18785d10b8a63b4547e62619018b8341d302ba84269e8615
Range Proof
672 bytes (Bulletproof)
Memo
01e3ac47ef9966d15e0d919d7c174f547f70d55c92bbf7c95aee2f74a50da9965c9ddf79d30fce075c3e1b0e756aec7c21c44b634a7cb205e20761b3dbbc17c8dd52c9e8d3ef02c66df6411f0bf629e854c9b80557bd1f04bd575f375ec0f5966100dc5da1d91aff3b2d9a9b3f1e11a296f3d9b44adfd1adeb88ec665b20792c (encrypted)
Stealth Address
a2a1a7b681bf328c0031fe9d8bf6ebebb9675c9f9e544488931852fb1461575a
Commitment
4a411c91701baa3305b7c26a870a9135bd376eac9a75199a1877f810b2f6207c
Range Proof
672 bytes (Bulletproof)
Memo
6d966c1ad7033cd6fe09ee8582ba6a53404dc406ec0ef11d1ffb1e9ebc4e651e03de7744b5003c15b9581cefbbee435565339a65db1ced7fdc15450489276704f3cf20645e5f94efa8b5ed1d66acd8b2ab7cd3a2c350c1f3152c0d9eb885758d697654b94edc6657c6373f1e6efd36ea3d71a273b12f01d687f0e1938766ce8b (encrypted)