# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
acef5fc18450347e53bffa9d31b0dbdc6efa7cfc32581a38af9d7a6b57fef140
Pseudo Output
f2d8dfa1c610b2f191726a1a2ac80fa00195d4fbd6281093fce7840496931c5b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
188972c43c59e0d01dc8aaf2bbb69500f850190239c1b47d4fad0c53af81bc17
Commitment
8ab29d6b91bac58785f9ebbe811c7d5de4ebdcb62b0b2f3f7f2745549e12017b
Range Proof
672 bytes (Bulletproof)
Memo
b658ff6df08d291ba3cbee6b4f6857092b9a486d71e04da1818bcbd373c18ad34ff984220bfa26be86141b25265ba2ac61e0063f3b916ec6152d535703dc3850b184d87cf7d0764a88cf230579d5ac600a8f196a3bb505ebc61b0ba128045325361752b1ebdd3bf7c1c488f4e786c2067c922eff74377591f9ad013594440061 (encrypted)
Stealth Address
cc18aa21cb1ad5012abd0721c00196a964c2a2a3851fc0730782178742d72e2f
Commitment
ba5242c689458cab5f3ce84d8e6ef857f189636238c97a4f3577e01bcaa9492e
Range Proof
672 bytes (Bulletproof)
Memo
7a792268c7f2e1c892f0454c8b33a929b111fba0150cd444a12f164cb9da01ed915be4d5a0c696d769c7c60040d75e46908da1dc41f177041b89219864fe6c76988a7c4ef4be7caaed291501f3f82cbc07c10c0a2bdbe89c70041d2e85ec576615bb21b317de367f64e2ecd78f9c06c300ebf34812832bd3ce903d826a8fb0e1 (encrypted)
Stealth Address
76724845f2f2e5ff70d19e015dc4518f5b11e0df550b9d91025a1167a973c21c
Commitment
1aeac60320819c467a4770f6d70ab1a81dfcbba534c6f6177b041fd7d7d21c27
Range Proof
672 bytes (Bulletproof)
Memo
b9924ab5b8ee03a31ec419a28cf474d781d0690478d65fe79d4ac70bac4b2ea0aa94a502246e4cb96f0d973ef2f923ac95a3ebb22daeac093017d6fd8032d71b79328e8b95dd69ef90bb9e5e6294330e467b01f2a5eb889187678ddb9c5a46daf43d91a71b9d4d17dd51983fbc3cbbdca08b27f3340632ad718199c67bcfb07e (encrypted)