# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6ee213853bfa27aae22ba7ded8ef77d39767638ec9665b230ed2329104d80d62
Pseudo Output
cc4b6277d6afc9e7d0058ba8bf63f0a1774580a21788aebff6271fd71a212750
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
80a4f0c21dc6df4377a176c70d3f2acf848e0653b1ad4b53d54ff9595fa4af08
Commitment
dcecc44e8c4cd84510f892dc867ef51274fbfd9bbcdf7aae894aa742da4e4611
Range Proof
672 bytes (Bulletproof)
Memo
de2eb1edc1eeeac5de148a8b3974dee07046916397e1f7f145502ab8c2c045df21cad5205706241e925b5808278931d8ae581f0832efd831378587aeba9aa76177d10564a58bda4e6cd2f944cbfecfc06c4b0339f69f8d9717be8360650daccf8dbc2ec185fa4d4f439394b8e01286a348e141ebb1d08afc38a2369de8bc0361 (encrypted)
Stealth Address
fe901f0c0f38dfc93ef1efc483cdbf2ceb4e87285e9a5f204fb6a891b7177f6b
Commitment
9084a766005b1ef14e722b2642a23eeefcb5b9663e1897ee4d2ece2982682a52
Range Proof
672 bytes (Bulletproof)
Memo
c59be13619975336af6269d3381c79e5dc4d7403e784e23907428f906a50850b0004dd9a73526ba2f1c761b493b689776ea8713b40f8eb43447aee80cb629f3e8c82008e9c1885d5113de8513993123e4ba0dd8f19665db09508b1c550726f6b8aac4b3e706fe4d39e1c72017397386187c77b7349a3e02c000b144e0a9c3f6b (encrypted)
Stealth Address
383511f7537d99440058952fc2db405c16b0375b3bb9f3def703d39f67053e50
Commitment
7e3a512aaa16b52c1632531c7b218bd8671724c39c9d534ca597f3a3d5e28e08
Range Proof
672 bytes (Bulletproof)
Memo
0f8979362df1026079fbc2e4e96aec7648223d9ad8f038bbcf239e04e0f894c1c91d42ced6f28f130068506ff8086499c1e5f9bb0ebbd9d034678636b4cad0493bb45a6e5b0fd1a2c69ba7bca15fdef80506a5411d449cc013b94918f33367a76705a66a5bbce8076c66c0ab41a2281fcb88d27a322d4d5e27ecd1e7aa1b7cb8 (encrypted)