# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c2ffe9ac0fdbbdbb61f9653b5904cfd04ab74144a963685b954b2f69ecc2ab43
Pseudo Output
42e8d5c0fabc17603b001a8bdc10c51c96e0c3e40436404fce2fccf43b384a07
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
60c9eb143fb6043d8b7153fe7e8fddd71ab822373d299b35111b1f1f5eaa6e10
Commitment
00b188c832783d25a8343a4098bde07387f53fe2242e629eadfc07ddc2d9d40d
Range Proof
672 bytes (Bulletproof)
Memo
b9f5bcbf97d5e0e3c7f39fd48e37e646226509369a9836388c8f74ae8e37ddce08fb2b2e4f7b685d4a9faa2fd8611f219831e94bd19cde8dcb5b8d67bd6653fe92ef7bbd9c55b5d45b7aeb6b393a723d3716eec16c60f68c16ff39644ddec9bcfccb28b4d77c5c06a86a5ebbd05e46ba42a1ffa574b61c29fd32c26f836df13f (encrypted)
Stealth Address
3c894ca5a0bd239694df667e98fe3737d4487e740ffd07c33263a155b86f9e5b
Commitment
462bccdc05aa6b4bb237d871cee844f4a834a8ff97507a5e21d884c23071ac34
Range Proof
672 bytes (Bulletproof)
Memo
a74711c72c6d9890b1fc7cc03d7a40faaf43fb7c699dbb49a9c9a7d042629c5d9d61552f2199dc24f4167e5b2a24b02424f9bf041d0906014bd509cc31f55ca04ed5607f896e07a28523d6bb258cb47a2ac9e64fd2755a92be98d8bb21b34574b21958eb4b954f701b25defa1c6115e7db1b3594f04a3af085525fd93f8c88bc (encrypted)
Stealth Address
ae934e5c7d78f6f9a91575fb7559d0e3ee86275b1d711132083d2157727d162b
Commitment
48b0e975220ef2eb43809645c9a5d3103fa5dbd44e73f5da1561523a22e5402f
Range Proof
672 bytes (Bulletproof)
Memo
22b475dc11cf77ff2f05cb370a82f01b20858dc5dc12ce159d2473d38474c3eecabe0a270e507e2840bce92a5c62bfc126a34092427e9a7c4a14eace625631ec0c690f87ddb5aca9eb4de848505540e96825ddbe67e8b138e48d6dc69ce7cb07705917f7864d38c1f1564bdef0c540f350def7a77957c0abedca199d668557f0 (encrypted)