# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
de744d2be87b74d2087c8f9c325d597c4d4f051232342ad40bb45279b8165759
Pseudo Output
1c8b6cdc05cbb1f026afd1a73a6385c30ce871659f5f081b2dbba281fc00990f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
86fb9e2a12334e09268180b554ff6e377a1eaf3c2f0b093eaec8898978a13f00
Commitment
3cd4862a2829335a723675b527d207cf22416de61d400f36786716e4b2fce61d
Range Proof
672 bytes (Bulletproof)
Memo
ae8957fbbfc01fb487c9f76e39c79251a6a6c0195aef05dbed9525bf566124e98c71dcd7162655060e004a3055f22288b98170db9c22aeba69b332240b6cacfba2c155183bf160fb2dcf3b4e8ad08e0984619f9dc955623ca62298180d9ccfb81ee3926548321b4de866be09578c2e61eb637ca3ac83a86afbc806a04ffe0da1 (encrypted)
Stealth Address
4a51cb1832f897fea40465195eb7c1e0d8002e930dd8ba627bfc9c08d1e4de7b
Commitment
a01eb93980e23a2645cc3a2e2861bd62b2a69421b9cf185aa9f1302048747d23
Range Proof
672 bytes (Bulletproof)
Memo
d5890c05223843e4e38b96d419998c87b3b8cf2c40928c55ce6af1c803b07c69b2cc3e86736e624efd51ab4c0a158933122d273176376f53934b26415266119545c0606a1dd76adb8ace1498139dba9fe9affb96f39f3a57b1b106a2ff111b66e805a901baef5e1555b05346456227dac5f2460103c59f454e4deff2c662e582 (encrypted)
Stealth Address
387e1120e670d038b075bb635c0b13ede8e0cde61ec7c70ddc5f04e618194b36
Commitment
1228b45295acf3f28a202cfd3ba65ae6e9331c6d7891c6c6c3280fe485e7021b
Range Proof
672 bytes (Bulletproof)
Memo
1c4ce8e3b8987c49a7870c67cf2a99b54c33118cb66c6980aa9a518c6a25c048348e9799d6c3841aef7d3c4f46e8e1b02371d1cf91b544407b652ddec15b43a1321ce103831356a0bedd45c2186fd59a33f18dbcc40fefe87a0e036b70bb5c4fa458607d18b915c6cbb8d8b4e9ff2acc4e819b607278d9907cd744341c6eb716 (encrypted)