# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cc01decfd10beba1863cedcfcda9e78ab875967bcf1b0c7309a82ff7f28ea90b
Pseudo Output
787dd305eef55dfb50e3bc48ee397223ffd4aa54a1921483e9883c3c14e77a37
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2a1b9b1b96f49c515ae838a9c07be197368994963118c49cda9ff55fea7ba922
Commitment
6a59573bfb13cfaf93e0eef11309c959d6de8496590e76c1ce5deffe55a05a0f
Range Proof
672 bytes (Bulletproof)
Memo
d48577d6020ae511287a7fc17573fc31e669c4a4a7f8b48925382f56d31775acd8e9d9f6a30f45b5328c83a9af18fb886658909802ad60a16bc7b8f42a58e739cb19abb898bd16134effe874dd41c6496fd31f4c77d52204d2eaf74eff4909f4aa8ec103e4f8095ced443c9f79696cafb744fc0c057652f5daba28694070cfb6 (encrypted)
Stealth Address
46923abdef51384eec60603b4c0438c6ad00565a26bdddbec31c2e802df0d239
Commitment
ce3e5589f539145b671258becd47ee4d1011e21b24e5799ce9b232294784835e
Range Proof
672 bytes (Bulletproof)
Memo
320bdc3bbeb37815c558e22a7170d01171f0dd1f822737bc5985c8c2639e0d1adbb1a234eb456d7dd2a7898b72913e5367b4296ddab8486a2f68c6d5e42d072328ec92ad8621138592ca7f8ebe4cb99c59da4dbf4b1498927e61168f4e850d7958781bda0d67eebe50af86c5ac346a1568aed1581c9190ac8939b31cf06f06b1 (encrypted)
Stealth Address
70ff458bc75af4404d026878b7bb4b8ea16a7afe5806fe54e98d41ec2d584c61
Commitment
ee4fda803bc4c8b4f2fc63c50c3388771b0c4eeb98fad6983f212d0abf54ba3a
Range Proof
672 bytes (Bulletproof)
Memo
0fc6fa966bcb7331e3f9679a866bbaf687b0c747fc70c8afc8f7ed30c4e6dde1ff2814124ce3186fe1aa8b49be4f34af239be89a06af8d0f6b59ae3d454d4612d8affc61034b2c76fa492e2ee504fe4e6f44c1412578cbd66757b054d71d684ab8f1c562f3efb9527fbaffb43f05fca53be39200b86cfaf4211c4a58e1a5c26f (encrypted)