# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2abad9cc47928c43cae27bc1cff1f528f6390773b51607d66734ff434b3f9f75
Pseudo Output
deb93dc2a13f9b8a9ab98c2500c30d327a61d19e8fd5536d50ce392a7c6c5906
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c6491b21f04b1d84da0ddae832b7b9947fd1b960f2b3e6ab5ad49b74735a5b5a
Commitment
00d946e710e30a40bd9c215712e5afccff1caaffd7a58fd3ff39e45635648a4c
Range Proof
672 bytes (Bulletproof)
Memo
5a2979da356beb8f2302426843901a6feb2435b3d8f022a57ae98353ff7141597df9b0808f4a149175472f4691156562af35cecf3982dde7599b18d273fdb543ffa74373ecb0084b7df7f2237add0af39862985ddf470a441e18cb79e79803ae793614ba89bbb56ddba04f92cf0a15a480e61bbd7ff03f58ed16cc45a9c3fd3f (encrypted)
Stealth Address
deba127c31d200fc113418780bf855b19c40c90327cf4963209b102d2d974d6d
Commitment
2a8b8fff69d17ef6511fc46047964fe923cf09299e4e220d1d0125b4a14dc833
Range Proof
672 bytes (Bulletproof)
Memo
e0a00ceda40d17b256050f50b27ea13f8016ca4fe78e96cd7b4b19619b4ff79f6eb87f5e64684104c6938f6a1751b41b565c95380e74f8b4075b4b7cf6cee3eb31fbc84d3857463d4f86c883a8fc5a2afc71236883179acb2915366cf738c022aa33977c70577a74280fb1782e2d981b4edea64358bf46d7c05f4fc29b03cc20 (encrypted)
Stealth Address
889041a307937e313a7d044424b3c6a6c6aaa9ff800846b396403d967a93d21a
Commitment
605348204cee3d3be88920ededa4732d564cfde4258faca439b3bce3298b7e30
Range Proof
672 bytes (Bulletproof)
Memo
2c1960132c58fee1fd7cb14d52433d608745e991a9821e83a1b3a17a008254d082e39c531161b03c4d33149825af3e8e3996df81bc11b83a4c9401be657fd2e35919c4a69c2f4a3f3bf96dc60416cc43bee00cc6370e72e76086b0b3fd179fb9e68066759c77304ab9a6f72b0d70698835c2570e24648174ad266a870663eeb8 (encrypted)