# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
849d096cc4d8dc5f239437831a7b7d6131050b08f94497305fb02a7c87da8b02
Pseudo Output
8c9ce701bc52c1736e3f4b1a0c868140694a8e8f1bf79a7bd5c19e431f186c00
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70594057151b6e4b1e3e77f4b1a5d1a2c2ad1ec465b06d23c15c8e8f2c770855
Commitment
7085858707287abf9f3aa6687df0df3c6750bd601b3db35772a8fc7774612f06
Range Proof
672 bytes (Bulletproof)
Memo
2bccd61553a711fb729e889a97669a0c047ca30729716c80ff9b246bef47875af1a3d474f3bde68ed9ecd3e531fe87f4aa904d3d858385c2396b724d50d6883bf6c19aac9d4855776f9cf7a378a15db48aace69e790fcd7dd3b1fdf9e92be2cc3da417dfa992a5075e3963b3dcbbfe52ed28712446055daa10c17a51c10bdb76 (encrypted)
Stealth Address
cee934a29a400c338055db0b7db46a6640e06df339938f9c0038b2585b20be0f
Commitment
56d0f298cc57b2b38f99601d84f1079a0cc61e49eea1d378156f634d151c9c3b
Range Proof
672 bytes (Bulletproof)
Memo
60d61890fead49263955f45d328d0e6e36cc2e1229b31754ff9fdbe426d50b2bbb66dff1a956bad5528721db01211fae2d0c1a832dfcb9643f11498e7507b8cd312de5d9c8bdde90c413f2a75ce87965616e6846492f74fbd29daa16b29ead9fc345d45d0867c9aec4998c7f875d00afd25ccef286af6757235612ae4723e323 (encrypted)
Stealth Address
0cb2ab0813bc9ca6ed7ec43b6d1864be8de697aa7b8d0b9d713ea5ff22576f7b
Commitment
e0bd25fdd27d270ea13a26f0bc63e04edf6b8449827811fb05b272a470a4d215
Range Proof
672 bytes (Bulletproof)
Memo
f3f94aa0ac81032759379641d43eb09d259a8ee078f30388db7f144c55391e435f7496fa03cc591cca641a6f3a5596b86d451bb1a3bf1ae8e5d57918ca9a79333cde7c26842dd133a69ab706c9e3a8a8ffaa3b1ef99bc789f7784c6f1b29a90f23dba7b5feeda6b927f71cfb7c397956018775221daec7053b9752ee93a5ac9a (encrypted)