# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b2df8e541cd409d85c25968a68f6d2ac1f8ba4ae160a75e9981322d95dbf8253
Pseudo Output
e22bcb35a3761e2d5e996054d05922a9da104fee83e0dfcca9d940d111966968
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dce860a83815f6ebb8129193f363c973535b8c68c80d03a838cf12742eaa3120
Commitment
3cc9d83432a1683bf803b3d91ed9ec9ea7c21b4b6d43a1c0ff41b936e2e23b4d
Range Proof
672 bytes (Bulletproof)
Memo
213c0551dfb510282dcc677039c53090380afff9377fc8832bfe4c651d9cd941960027608eea6c99f55b901cb86b9fd61a455cf5257ea84f73ebbbf79a96d7e422f24afaaf5bcd437ed47744f6065a58f659b077f3dc007c2d5fa589d22785b4a0ee10f72398971a3e866f7de457e0af84e4c9a58e8145a279a5740d5b126d8a (encrypted)
Stealth Address
1cb73dcfdfcbbdba85f8424b6b802eea02ae8fb827ce6c8a4a2a73d74bb2c402
Commitment
562f2e03d4729f47c61fb8e2e166a1cd3c5e6269a0510fbd360f98aae1c73004
Range Proof
672 bytes (Bulletproof)
Memo
5c1f2a6ea2f2ef1db69f4d23fd5fbdb32b28cab7c32fc90192b5b9c17cd4f59c6771e6008115a922e296bfd5f4dc7e000d94283adf8a4aff17c6b74a49a4b1e7cde3fd8ac0cdba013f1814771503f182fc9043d50907029e0198f3b9f75e94546cf31fd79f2b0efe05293f78970390ec180dce59b0c745d1dcafac10f42b2050 (encrypted)
Stealth Address
860306b2ed068975dec0a0f90e9142645dbf25266013cb0c306982c5ebcc8932
Commitment
c89bcd427741b69860abe6776be8a930207f40f604f3738f0c3c17244bdf3a01
Range Proof
672 bytes (Bulletproof)
Memo
376f5ea6b9b3c7dc54bca2fc7515a0068d63f98b360141f20e428079e6d0cf1429af6327d91f4396a2b2a1edc28a724c8a739a46ae9d621cfc65da1181d150fa3abf007e4d9e61d44ec70a8e59c33716578a0d3442db70ab77c8edd43df11b5ae42c9923a4354f367ffa406b41ebef2bb1b04297707ac2ad107dad715bb48e5c (encrypted)