# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc6a12f6de963eda9090468f186fbb5ca8d5d188652d0ed304b33cf5df81903f
Pseudo Output
dccd9b8b2273a7b6514163ed92ec0035b37b95214b2969d513fb21b711e17800
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0cb3f2bd461376717a8bdb4574169fd4e5a9a152eb77b203a3660d80b21b4812
Commitment
4aab5063faadd040f9e31d126f9b997f37d1895437d2d92f655a79fba683c347
Range Proof
672 bytes (Bulletproof)
Memo
7b404fa633cf023fdb3c29de8531b96742105d8f1e221e0c8054dd210ee8a68c2445bfa476bee4c2eea191ae013280ff575f0368948d40c610a2d35d4bb575bfe5c80a98c1f7938b91577b85e76007d2bde2662612e175c1f6d7ccd02be4b0242b1a74f0a560da8ea4333031523aeb1d73b78bd8af9950506437a036b255d4f9 (encrypted)
Stealth Address
ac57c03ea7aa7bced4c9f85359a380664b9708019d081146a0b61aee8c85a04d
Commitment
5687406985409aa99b8f640133161ac81d31c89064c99c369fe1674b1f9a0e3f
Range Proof
672 bytes (Bulletproof)
Memo
78297dfdb8e549f135a21767f88945fbaf35eb9e0730019b3112487e747ab3fe2e072500923455d24dce055b71fb247b0251c85a4dda026d1bea2fd44f8794eb0a9efb0059e720eb5dad45989f9d0b3d7dbc9e8a5e97229c01068bda71efbcec1053e8dac47a5ee4af588798edbd83bc877723efc15b96fd518622561417981c (encrypted)
Stealth Address
a4a4a392bafc1b379cb66c7a40febb8a5ff4e16fa1fa40faaabb5427e5d0ad03
Commitment
26754703bb07d8775cf37cb7fce5fef500a0ad621a9e850b92a3a78a5f6c7e7f
Range Proof
672 bytes (Bulletproof)
Memo
e4bcf884717a3f800bccb2608de350b70f461725e62f734dbe26f5ce6e29c822bd7ed43472688eb38ce4504d6cb2689a24e8fafe5009f5236fc7c1d42076aafbe97e4675ed895de7cdbe84707e8ac319f4ad1b392efb0f9192c70463c92f5b8160caa09cafaa18af4c38d5f1ca345f6911f208b0e2df092c95a2a235ffaf7ad0 (encrypted)