# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2c9ce1dce3c4ed5d8d11ce03fddaff4a73fbf910cdb38c41c8a20da65b4ba227
Pseudo Output
f47607ab8e7aae9e7b0c10db1c45c020261d18219cdc5c60712ea96a2a2bfd5a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b0d718d9e03b8570bf6116c9e4055083a6c3e57741a12fcd0554963b084e197b
Commitment
bc958956157bdfb40c24dbc312ba9c83c11e6cc652d978bd7eb6ef3c2fc1dd4e
Range Proof
672 bytes (Bulletproof)
Memo
2cbb84ec5ad336126f22ecd24cd67a30d5968c0ceec559fcdf2e4dd61874c55214bdf27eb97e68ea5eadfee5bf4d532523db9d7c56540b09c51224223dd86608572ceafd7946b40d64530d12bb794181285c046e287e6dd4fa44e9ea35ff299d54e1c95aee4f1544671a4028b588178922cfa8d1a5fb185dc1c688f50652f4bb (encrypted)
Stealth Address
6247d696dd773ed71bf0f8e7a0b45145bdf142c673e7ada9a81029128417cc0f
Commitment
e8d17f7654ff13d78d0d1296de42c2cf5c549f13e4f96eac3b952c8a87dadd17
Range Proof
672 bytes (Bulletproof)
Memo
83a273a80f4eacea93775926dfd7779196fd076b1e0612c3989ad3caf1fc9276e8c47e96475d355800f03d02243ed8015fd6314d9b5c5c59892a50cdd754d46bfcbe9121c576930c96b5106c4f8254e2b3652a3b8f33ab01d33cd366261e50b51e05b56ece0a362af6de1e96900ba69f1e0c5146a440566b169ca611584a3d37 (encrypted)
Stealth Address
5c5ab0a7480df3b17db371655ee880c58ff19f563273d54b5031e94eaf03245c
Commitment
4aa9e8d87a3ea9f58ece74d4433f6186544296d082e398785a8418cf6405bb7b
Range Proof
672 bytes (Bulletproof)
Memo
e1f702ef117df8176b059c76331abebbc837c985c76f54dce982fc526d847109e90c5db5751212fb65602a4ec891c2361ab60d3de1aff9a424e2742042df5048ec1a506f7057767eef5825dec3c4c19d79a5e921ae86a7aff5ee61f465246084368ca0a5f26043925e5ac4ecaec89dc5cd8775f00c6be3a4d911ead050056adf (encrypted)