# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8a388cd1a681beec534599b8727357326c2792664a0461ec3bafb49e2d4dab50
Pseudo Output
dca8546c3573872c34c2702a9e279cbeb5c2a9d0b46eb61a8bef5b7b1399ac64
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b841a0c5c181f2496845f86eb7e4e90ded9aa03728a3e5974e3dd65de1920d6a
Commitment
00fb2e516d4c24170c4a867927b012523d973f1d90be15c0aea3967124cc3244
Range Proof
672 bytes (Bulletproof)
Memo
da4187201f271a0084d6ea3443f1defd912768e94ed30519973ac0b4c2eea8f11f57d4788c4c30168dae8141af7e1064e1c02ebaf3d5e14e08b163526469f264c018f141f8fb3c3c11d6edaa550373137c3acd31167602395e07d96010bc71f5df34cbbd84527cffed93e6c3d5097551c12ac5df6cd343a0cdd48ddb1688f5b1 (encrypted)
Stealth Address
92d6884124b48a5a7dbd56213391467d95365aae4f6091d2ceb89aa147175221
Commitment
a03330802f997565cf109303ac9a9fcec49fe74f572c6090898154268adb120a
Range Proof
672 bytes (Bulletproof)
Memo
6acf3153a85c5c7d7f4d7e20d7203b79e58b470eb9f7b3b8240e811a72378659c0895a702016c20cd94e2ead2f1dc0a05e00c051043d4bc738e1cc4bb1fa26154d9abac850c3422c4860e36f807710847d6051b9fe946867185ad6db961e2f7a78e9543118c4699060976da493d3c9c95eac1651e4d510f7e3e809d716cd485e (encrypted)
Stealth Address
845bdf46cabd15d4713d725476913c0014bdc84756821388669bf2dce095e543
Commitment
c85e28bb7eadc7000b5563a2713019cbc830454f9f0d9e439ee84114ed778b16
Range Proof
672 bytes (Bulletproof)
Memo
8163cc68cb23c00f04d66bb15854508a594b4f6af085c28453a6d5caf7ce35cad47290c8bd819d6ef245acb70407dee8f94fd5813621000ca67fc5fa0a98b8c7dd7caa2019e50dd301d89c1477418118907c735e3ca3644b9e3fa36cc11d59eb1e1a3d01e2b47f73ec6263a793feba1c8a7cf9782ae5737ed79feb074348c201 (encrypted)