# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
500cc3aaa7a0dd937fd3320e258d79e631c7bc99dd8037458c7ce2a7283eab59
Pseudo Output
0af8c0f5e373759bb21cd51e14c0d04f392bef2a28d3992b668f8acc0ba8ee21
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
946ec626690d8b9c2209e8eaf6c82581cfc6f026aa5d821313c854ee68a1be24
Commitment
68b00b15cd66e28bd12efed513bf621576dd3fda3aba98ab6b808e8363ed1e61
Range Proof
672 bytes (Bulletproof)
Memo
a48adbad065e79ab7536fa401511b1ae0ca3ec5fdbf717ddae6d228c9302ec6e63e3d36bf2ed269191d4ca7b1a260e17ac929dd06802f0de46d693f24cf6982182f289c420ee58444fbf94e159199fac53c1d840d1c5b16f028f1ffd1e6c50b663acde5a284a9927dea04eb9e990d526e809cba21b5480f3752bb0257f6325df (encrypted)
Stealth Address
24dcd2ad22635e44cbf1980c37b48439d85623255395e22daaba7b30eb0d2725
Commitment
108788398c6a8d8460de87ae7d8559bcd99980cb29fe8dd46259bdcbf314e81f
Range Proof
672 bytes (Bulletproof)
Memo
343993876ccb8cd9492573f016920b88e9bae1e4c85507bae56dffa2d7ec453e26d3c23e6fc1e0adaec3692ed509893dc9404adea019ee85e6fb0e368d1c32b60cf51c86d835758957add02c1547e42919c726cb18c89f411fb69ecf9c9b7dd309f5e981c9244da71caa8da6f6e9ed606366075f197fd264f1fccd325307bcdf (encrypted)
Stealth Address
889e2a28dd720cda271bb4cefdf6894025dfe00bb3ead13837bede59a6d4170d
Commitment
16c23b8ee997f8b1c126e2bf16022f79881b4828b3d887ef8fea826dc24ec325
Range Proof
672 bytes (Bulletproof)
Memo
bb05afa4c9171b6f9f032ccae634e056f91bc14ef2cec92df462ad37ad1add3f6c5585caee7e2a2fb7f7ef12cfada1ff8c572fc406f74ca7d5ac56836b8f574dd7b4fa1233ca6862f98e58c155a338acfa6b6c3a49bf5120fea402b6708dd2130317982f2e442982665b79fb02d9aa184858fbfa17bae45742921ec6fdbc6a29 (encrypted)