# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
70312ba8022161a72cacd6ba972b95bdb138f96a5a15f32dd201f176407aef40
Pseudo Output
34a8d14904e0ea4fb6280dc3a43e4b13787c4ad49405734eade60d4635c94e58
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0c89d065fab9025686d39249f0824125f1877f3a1a4b94ecc2837bf93981d541
Commitment
0cfadcf00236e6ab87bc8f41d642f6bbae6bd91338a7b8a52f7ade8ff6e66501
Range Proof
672 bytes (Bulletproof)
Memo
ddf90463f124a558ff2966fc8b55628e9d3b5ae009847b92d5d7dfed36ffca8b31691779dfe2f2019ed08ebf5b4aeda87782cc9b6e3927df22dc2f86184e3dfae5b26df62f9ad9f812ecc0ae3a90986f8f4f13884a2f850b30701db2d28e2daebec1640bc951e22c00b7dc6e560012eb9e55227673965b4e7fe61af4405170f1 (encrypted)
Stealth Address
8ec82b1d3978e279012a3834d9772ff46b8a290038ed32069bfe236913f40e33
Commitment
dc435718e72fa47446de24927c7bc631fb9d718ccbef1b1567d4bdf42146df7e
Range Proof
672 bytes (Bulletproof)
Memo
32f13fce1a45ae22441d0ef684d8e653da3f1d46f0abe4d0e1dd28abe931299ac55e47377658a2e2c9ad9cb0ac1d6eecf5ee300c59cc21ab8e6ad3c37706b8f5ea303d0b9c3e490e8634d99c28faa9220677fb09c439d454d2350caa12011fdb2595a19cc4f0dbb1ce91eb7eac0b93a68d4b1a776d78c878f19e01cb0370f14f (encrypted)
Stealth Address
70ee688aefdcbdc1bc14ad8f01b6204901897f641a15f253e2ae491dc6fe6041
Commitment
48338c9c0c6fad2b5aea8ec5bd4d904f240ea738d9daec2d10c62f0b10113f02
Range Proof
672 bytes (Bulletproof)
Memo
ff07e0b17f0b5ae69ad61a9e49b61377c882c21d67f884771097366260b1d825832cb544963c6179c931029d807c584e1f7f383a6eb67beaf42f8759ae5b434d959cbadc9038a37834cfa41ca4d117e559148fec2c7d00cb611afc49c1f563a2316feb61785a842be6379277b08e6e8656df9573138fe5370b43ef291d5d3763 (encrypted)