# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08f91cc8a44359562910f8bf6ba881e2f1bdc9b4feaf75d95680c4cfb138ae5b
Pseudo Output
dcc5352e9494e74e3eb538eb6d4ca4368b2fb3041cafeedf0fcefdf3ca37366f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26ed745a50241810e30fa5ff4308bb9bec3a7ce3b6b81a23f73d08128f075b23
Commitment
c8eb9c5cd613a10334ce39056bb45471f180369cf6d681a9583b9f22f2f40138
Range Proof
672 bytes (Bulletproof)
Memo
432024bf019ad088162a5617eaf8c8c9e9c5361c89770f2f18e7c9b1b80b3f918d95aab9bc704b57f9ecdbe249fc7a303eab12d7558f4c633d69c011b7a894c68955f6a03b0335b00bef80de4748c51d94914f313c394aa8c4290941d9da97aa8048943e73d671524bf33e32417c88361b5fa843a7a057e28119d35a2aabe7be (encrypted)
Stealth Address
4a6b49a4464d059b3eff4b7d5edccdf2aa4d36c1a7c9cc338d1954ffbc901103
Commitment
dc0aad6804ab0219a217bfeb4cab5e1c2d9e0ded076fc672d24023d8186b8346
Range Proof
672 bytes (Bulletproof)
Memo
0ed6b11bdecdb6ebfb9647b23b97286710798497f08f431cc15b44b763a2d1184af172c9018b8f6e6c86c362ca7d38dc73328c3fb8ee1de424555a428d3cccd851d3d3d797c3b8a8e169b26f05635e4342ef1deb6cb53e252af3d43096aee15792e30857057effefea6ebdea156468e6c1627a71def4f391826de9140967c36f (encrypted)
Stealth Address
a89a5ad9663f67ac0921f0328bc4f657b7f3512dfab706800dbd40eec8bed03b
Commitment
3e7aa213babc8092bb27803a96ad9a25f78e4d67855edb858b62327af7dc2a4e
Range Proof
672 bytes (Bulletproof)
Memo
582ab921783d6ca50fc8ee40e45698ad3a6a1d44914758f613bf0919f3c520b92711cb5ac9865cd20019ce80648d308d4ded8e9d99460663eae772415b77bfbc36e2a15eebec21caba12441745a071c6f74330ab5bcec1ad01cdffc47a8c905722c097c44fed2661b21f0230dc200cea8d85382994d2b10cb4198fa03ff898fa (encrypted)