# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38841d5b1449576f504d3fcb24fbfc1f810a0ad256ce8760722622e5373dcb56
Pseudo Output
1c5fbcb5a4fddd97cca1be5344e6468f09337c2c8786c1a35f8762220d022743
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9cb2e08e00b6d9ff83258866d395ae95f2fc4f241e0958b8d948701e67da7548
Commitment
069776c6e2931681122e66472d909ca05f046377d03f7961213582cf33235c66
Range Proof
672 bytes (Bulletproof)
Memo
dbf2504ae2b797af5b94180222264317192b3f08b995c829ff1015c7047d5a2dc00679697d96ee2eaeb383ed667fe71b4859dbf3d290118d900b36ddc3a8e320797be5ae16e7d424b95d28006cd2a60b83c99c8b602ebfc0987c2b9e44842fa20df422822d350b62fe3e89bde21be8194a128731f812329f4e8928dd7717e870 (encrypted)
Stealth Address
72ba8b912cdcb688ddb8b5a55f8afcf6f8964d0be7a7ef86e3dd7be217b3563c
Commitment
6e7a52a09366c2908a35fd0a6ef0458dbefb6f2238f65f651ee1a0c11f139f53
Range Proof
672 bytes (Bulletproof)
Memo
7aa2bc0010c7cfb077314ffc6d291f0fd04d8a42f7750b144c5ab3ecfbe3ba1dc31e4d62dca718c473f024a7fdaaf6beb3e20f04cf2fa442d70876474e378502fbbf66e04a0bb9ad7371295cb2bd1fab32fe13ba1ffe27e3c18989aee90b4352be2e66d62df3c398c579cd98b6e71a0aa6afb5ddbbc40fe7fc4f6501fb9a01e5 (encrypted)
Stealth Address
522914fb91ffe1cbb4baa73c3ecf6eacc88060ff83b97d997931a1fac893d33c
Commitment
6c9e17609eaeb9aff3991391341fab34b03b23b4e21150738e32d81edb6a127e
Range Proof
672 bytes (Bulletproof)
Memo
9c5f59c639ee85e75fd9e59371987beef5ece8848c82e7d27a5c710cd3f856d354d200e6ddec5c0f2ab700b38acebf150f10be2886e1183b1bc267710c3aa9e8f03087b03d401b970dc7db86f7c6289bcbc9ecf6256bc568accc9c7e7a3074e0f188616172965eabc039f342e662ad4b61c77dc8386244f2b629e269457252bb (encrypted)