# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dc23ad2cce55d9f4dccf4f833bc1a99445ea13cd5763e9a1e72f691e6557400b
Pseudo Output
1446a7f12b60fd901f73a8c0978142fb647c9b79188f1467ee58ea6b56c50c2a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b68aa7f81138243c95b69efe262441d73cb16cac6c8002191719d4dbeb68dc5f
Commitment
9c831775cc334ab58eccd1c3176f88f98c604ce2769b21a8236e59d36eefda54
Range Proof
672 bytes (Bulletproof)
Memo
c2aecd88286f082726d6598b227ffaa60ad6fd9c65ce706a940964c322806299b0f105c8cc8101b75f041674d154e3642ff82a3d968164fa8d3bd1f0418ce51a9a04aa5306448e70831803bf6d54add067aecf17c0f7fb66176ca4a1d6749c13a8893c1ed685bade82a336f1ffa3c2a2c7c53c1e341d424bcdbe8e7156b0afe9 (encrypted)
Stealth Address
cce43a4cbe79cf64966a41206b6f2783325f2e9ddc77a3f800f234f3c335027e
Commitment
300434516e277a0d36e74a84a0f722f24f1bde5d7b49d54e4619698524d0c773
Range Proof
672 bytes (Bulletproof)
Memo
2ea1f82e03f2910b61b3d849452bc4149ac5c571341de4817047c709c02435ef46df59d01ef4f219252566895f155b0b8b75454eee8068666f18cf7c98046f04d660f7b2935e39af547f5b364bac8569694826404ea34a4974f400d76cde541aefee63f4f12da3d30c04dbbe9cba79beb5de166c02876beba3f9bca72fff9dd3 (encrypted)
Stealth Address
5e512acfd527a0bae4bdabf184e1248cf9c312fdd1faadb7d311ebe1c7c1e770
Commitment
38e75a151d9d94a9884e095929967c3b357721726dce8e9a8e4aaaed70910845
Range Proof
672 bytes (Bulletproof)
Memo
991bc618e2077fecf95ae06893d8fdc762af4a1cab20a63a1d78dc146bd00e44531d08a33bce0a7a32df4f84f7de470aad861f22fcbcc184b498922c09c698002e56cf5006629b76c7ce47898488e2e6b77c0e34751f604696ca5ccec592ab63e0b7d42e559035c3828e71e35cce275d5e83c8d8471a679b25febc367aff9249 (encrypted)