# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ccdec25f8309457db482bf770054571a3b7855fec0ce632df72e4342740d486a
Pseudo Output
a00d87379464cbb893d874f5b80fa8d884588aaad47129ac9fb96e3d94534230
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4015ad69184968e1f84f5c6ab2639219c8ce6a6a8af34224a1f497d358647e31
Commitment
020b1be5d6ac3f8f4ccc3929b9dfe0a8aaa58bcf2e9e7456392b355d9eb49f16
Range Proof
672 bytes (Bulletproof)
Memo
9290b48184a9dbcc4462429750be8ca3bb54312f31d26e7d4abf05dd24e5a115978674e1fa12c84d0a6b24e11c0b4598b369baf70c3573f218914079d02a2a0751d973e41f101f0443c87f81d27675cf4e834909386012f918607869f596e00f3de7733f25723535567ac17de2520e56a1ca791e5af0770e8b3b2eda7fb36fdf (encrypted)
Stealth Address
648221513f535b2b12b78d00858cab2e98f97e0c7f0fc1f5601f48f3e1e6d425
Commitment
7407d235bbf00a17075afd5cbe0692adf58d3a41f3b8f046c5e2e9b9a8df1146
Range Proof
672 bytes (Bulletproof)
Memo
583643692e50bba62d333b33b58fe9c8bb0e7b7a2675ba4f1347596d7f4e26ea368cb460b538740b36c733b691a8286f42db2c4b10e78ab05018c1e33d3b43e2b4fa00578d84f533618fe039021c38611468f90734f4067c2a9eb805a536f11c3dc4414714623ecd9ca2e6434002cac279b82ccce13079d090daa11c471e3839 (encrypted)
Stealth Address
1a7123f0846416ef43168d35fabccc62c104f8e17e932a5ad5deb8d5d69ca62e
Commitment
66ac36c770694760ed58a0042e880dc5cd24854716f8f9265f13266040787373
Range Proof
672 bytes (Bulletproof)
Memo
309bb2ae64289fc6fe36ab26b4912126da7c2a6269024fa1e402a616770fe8a111ba86f833f9317306a28c7384784d11d7850136e4dca19f509707832caf1ee02b83b382dc6581b9bcf099c9f2e78b48e0c95dbfab666d5ede7ecc07be49aef3b867b038a7168343755b3ca6bcffdd4e3439db45e3bdc427204b7d36b77cb0e2 (encrypted)