# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3243914632bf959b3f4ec4b144beb9e292b148a1f763c6cab472c5f8225f9d59
Pseudo Output
b4a0728399a3e0ae60cfeffe59740fb5e3a43a00a0eb8b29ffe79dc47c76cc5f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce8a9674099679421bcc0fada1323962bbdf14747e2c6e2a27db99829ea3b243
Commitment
600dc3fe0ae6462d5b78a237656eee8981a19c5fbc6a7fb21460645e80ad4478
Range Proof
672 bytes (Bulletproof)
Memo
28b5e5ef0ec09fcefb4bdf377f1df7216390fe1811fc79e27bf195d6a4e4b7eb4c16f0e99a3cac784e232cbe773f3c9fe27e52edcec5173d10876151159db03c7d24e14b5f5e1849570704844a3b2438b7275dc275700bb38b03c5c10c645838d9e000be018c9ae121721765ce464a834b9ec3c9241d746298d7258bbe92ce52 (encrypted)
Stealth Address
1ad2c4dd6e681be12213a1b53740f7a414e4082d45a3df8b14147eebed70b219
Commitment
8089cef089762205d46ec80865d3c0c5ca2e453f8cf4a214cb3b0b9258dada39
Range Proof
672 bytes (Bulletproof)
Memo
c63b47d6f6761323920d58cbbad33900938f3582aa88b411f065c2498abaf676a3fb261a81f4f650be02044539082491ac76eb7351398735f0655b888792884146de5153c5375c0b63a22c23afc2d3f0583b398462c67504551176150dfa23c552f9f5fa388f753391c1c12cb7c37def0a7e42ca2004a5a386bd13bb0b78b92c (encrypted)
Stealth Address
dc52977fa8b06800e822a43e7f3c67b1f2207ab4499bf4fe21e4808868afb730
Commitment
7a32fef369cadf79601a56ffafc190ffb11a171ccae90ab3d01b0ae714272a11
Range Proof
672 bytes (Bulletproof)
Memo
c162ebf00ab6757aeb4cbb0bb3f8e970a6f88b62838a4fe334ccaf52c6727e1519cba216ac35872f4dbfdbc5f91a8ca33c89375f6792b18e9e2b04cf1c0a286d109bea6ff8df144bee1def134ab1b963b8b5161d380da269fdb214131e1fee3494296594b3091079888b1c89da9fbcd592cb672629ab8df163497e4c22023a81 (encrypted)