# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0fea03d1e17edcaf8e58ff0c471dec9446e1f1c893f6e7d283a32f41c6ba710
Pseudo Output
5c74c01a3632d18888ea0cb3f2f5ad53fc2ac5f3b4b2bef579381d4a09988478
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c9005a907bf78ef90f419112d8af276d1e014cd6acd890dcff049b177dccc50
Commitment
606b0124a41652f9fc0d2b3dac3458979b268c0b268c79a97b98d51d83dd0b3d
Range Proof
672 bytes (Bulletproof)
Memo
09950a08ab8f2c63a4f7d3273d7c08ed3b51228e0849915cdd97de38aecca27474e16bd2f9bd489863a1d76557490812b09e27c25db8872c92526cf133ec7160bbbc19a3f59fe27699a73327d21eed7ab34b5563aae69e238d69ed65254cf26d4ab569f9095776200904d00473694961e7d147047b1523e7b7848addd81ceabc (encrypted)
Stealth Address
c61119a1d26da11844edc3629fb6aed6699e74f727fbb99d45339a34f8ff491b
Commitment
7a948acecf26a7171ff912593e71378786b561d899eed85fd2c4b7decc8ca32d
Range Proof
672 bytes (Bulletproof)
Memo
63a475f28a969209353ca3500b7339229837d163270f394e29f25822b6c32be70ead9dec3a1a5ac75a90366e346843c674e3d5bffd661cb22308f8de3a3af7b5a4d76fbda69c98470bf4da102ac613a6ec11e82dbf0727ac30b85f8e4bd5c9621c9f7ae5d8ce84481ae1ededa676183d48dfaa0af78b2336069f03ec35ffbbae (encrypted)
Stealth Address
d0d5a43409e6afb18a439d9f26f081f7942389ed96acad1d4ea6c990ce2b566f
Commitment
0670a16f13bd175e55d63a5063a0e491a1fba5088f2bb20a0c805b19b284474d
Range Proof
672 bytes (Bulletproof)
Memo
90bae552a981af37af1865dd5277740bfe202c0b070f83a7ebf07a9c535a109e9db74619b3b30fe0f0fa7093758b1b372b76da5783586008b3f863c3164a5fb49be1608c6b0e29574ca5f3462469a432ab01438aa57b8a0723383a6a17d3a79d0dc81df6bbe256ba6f7607447ee80e91734a021acadcdb5bf723937b39e86cde (encrypted)