# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
462d1cc512060f56170de63c52111b42452d54a9e27645feba9752427e25ea66
Pseudo Output
b643dd359dc6e36231c7735f5cfa3aa24e1089575422cf4d19c3afeaf54eaf29
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c0e51f671579bcafb7905a16b1c3645bc10b0fa0c8965eae296d9e54f16fe25
Commitment
14e66859d1c081e941f50b3ae11946550b2afa0c98c2eeab84943605f2e9337a
Range Proof
672 bytes (Bulletproof)
Memo
07cc7826d182b0b8db72ba37e5c33a1d3768c47a358801d14612c2dc37a1e3dc5b0e193ad7d94c5a74923cdc5cc471bad28c4583d9d439f0ab4dd6fba3caa161776451af4f4c211615726d0ea6842c1a44f82a1de8c122e60dbedff87ce241d20c7101fd428a33d5002468346cd51aa8b8092748bb2e2e00ba620881e5dec2fd (encrypted)
Stealth Address
c2028bc29097ab5849dcf9ef02e6ef98c01f1cdbfa682511190ec89bb620eb23
Commitment
820542c38c5f56b3bcbddf4ccaeb064dd6834c25c935e5a2c8fb98ba6848312c
Range Proof
672 bytes (Bulletproof)
Memo
53bc01e5a0119db0fbc4974318a21b87f327c883bb16969f0dc5b95e085b34d22e57f1fb0cefcd80adebf43a184edbee9c2e60a1dee34bfa8e46d6e05cb3224c9188a3873e55537d25067d3fa368a34fa9e48bc35dd6e2d8596b7d9311b6661a28c4b3b8473a5d46c6fbe57327645a4f622c73643fa9d9551f0efb00af772ea9 (encrypted)
Stealth Address
e00020e0eee55303b8604d656d0c25f5d228f774e6ed7cf256beae4c7fc39e76
Commitment
6e5c066d4aef3d2b2cbc4390b22fce99f83f0e8d558999a78bf11971b9dd4c6d
Range Proof
672 bytes (Bulletproof)
Memo
b8df3efa6ff800141fc01b50d62685fdf8c179398e22b7883fe7d4a7c575b9a9bca661d3775c44e904d0d9a2665a40a6b2af34e9d656a0dadb0efbd1c2f4ec8d1988844ebaa41d40388e43d3fad9d99f76367bde7c1fd60abb0148fc1d4b646054a30482425a1b38228cc090d77f26d9dcbb99fa4934d1fba33069f8d4f68dc8 (encrypted)