# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4095de9a03859efefbf88a2545d1ade8acf4e1a9f9cfef54cbb576ad4d79153f
Pseudo Output
9a4bc6bbc33cb7448ca5186305ea37a46fdebb9c4c4b9b2e4590e4a3b85a263d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c220e4c3c33c7cd2beb48fa6d616e5600c2071c93b19b933ef86c74f76110e7c
Commitment
5ea8890f1ec599c122ff411e1341f6bf040bae7f394e4480c4c9a3a3036a1c41
Range Proof
672 bytes (Bulletproof)
Memo
63f4e97940fc31ed3c2d79ffd3df6bc4b90fd19052d33f622de3a00f4cf43b187aaeddf29cee00e7245b82c5069247246e6acb1daa8204c322dd89d643b13e1db197a515978715c906c3e3ef52a4a9579025f7b9b4c281a2a9f6321e80b9a3276839805dcd91730adb5b41eaa73456ba14e4c7844b15689a7117414a655743dd (encrypted)
Stealth Address
6c2efec7b49af6e4984c353ed9ea36515b00d1f00cc7dc1318007b4d8abbbc38
Commitment
2c1922504ebb4d1ecf7b2b3a2f2dde142c138448f85e71a3d1eaf8a4e9b80600
Range Proof
672 bytes (Bulletproof)
Memo
b03c1d5b8b294b01e06d4122a9754c8ec3a89c2516ed044aec5d94d04d439687bbdf1b7756493d28af4e304ce29b311b958f453b4f57471429cc5cadd1a182d1229140c0bd51932fd9af115af261ccd5e0d5e194aafb2bf98baa2436424bfc09a74af3634e841faad45fe9aa384f05df1a6dbb71362dc379070322cfe6a481b7 (encrypted)
Stealth Address
22ed863762d2d3355ffd966d9caad9031fab03585dd4f9a7023adb00f88fa318
Commitment
50c7477cb612c2d1935a33b5fea1ad7340fa1b2355238ba2b65fcab551486b55
Range Proof
672 bytes (Bulletproof)
Memo
bd5321bdef93f06f6f7337d37caaf1768b2c3485465438ad8f4e9a1e2aa8e1acac8e950e62a53aa64740cd9070c84f19ef56437b8477c22a3ac4f8703e02f411ee785a2fffc27e6d7a71f296d2f8b7b08d02766b62fe689e061f0bd144dd48e5ff374c582031ab9c6263c33b374c85f976c02c862572091ed855dea4ca43b326 (encrypted)