# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc6accb79e80e35b8deaf7712b95d8b5a610478528ab9d9dfd1b397afedb2f1a
Pseudo Output
c8c8ce3c3cf70d45a487a1d24399c9b14b1e39d4c379bde81bc3c0afdd7b9427
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82b2d77a6d3a3bc230a4923cc755f03ef403d50acbf92c63d31e2ee383e31650
Commitment
96c858c6be296020ef58246e11e258c1027522f5ccbfcd2c6c6e8f75f72d485f
Range Proof
672 bytes (Bulletproof)
Memo
579ef6c150e50bbf115ee70c0d70b1e92ee36155326e91cc66c4c913291687aa56fd151a297ace1636beff36abba853db8dfdc1cc6ec6a5cfc7f99d19667b5d1374d900e18b1ac61b0b22b201c712953f477e94ae227adc3cab7fd1b59c4717d18de268e2fd40a6e2680c311d2c792a619891d062188d4aced0cc1dc88435123 (encrypted)
Stealth Address
e80bb7c5d730c9f6f2adb4c71d1fed66a5bec4e1eebf79f896542fa400dde973
Commitment
12c51796acc514eb2bd9fc20f8e9f4754ded4a57fa21768d20e80e8b9a76e128
Range Proof
672 bytes (Bulletproof)
Memo
7bdc3326aa2e36c6e59268b42dfbe2acd5b894dc843fd0aa7feb46d913c8251f9b9196ff3215657148234f94389f8f94b8e27e33267d9c4b2760c5c9197b81ad5919a2aef7c6fb84529c7e6828d8cfde76af384f779992ff79ed564d7f4415c0f03f2af8247b379340c61daa082af2a80283b95a5f21f7f2a350f66d56b92d4d (encrypted)
Stealth Address
8edf85da4489105f7673b825208fff4a06f8569a960f0fa2566294b2aad61925
Commitment
ced8062aad038704d885e2cb560a5fc0e0bdfd755441cf28ac2353de0c386342
Range Proof
672 bytes (Bulletproof)
Memo
e195e0b34c9fbfd6961c690e2c60d94a4bd1d1285f83e87e3e6353dc8ee625c696255adb3a408567aa885cb1565f65bb28da896f98d7fe6d30168f08629c355840c362463bbcb60e8413747751085ebc2d33ec49ca8cf0f253d2eb44d5cf667435db56dd3f6f0a855b6549f91a315cb373de4a8ef76c3abc8ab44d1dcc85cd75 (encrypted)