# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b6e9de04c2d2eec2ed02b68157357b4191907f9c707499f38789160cb3e47177
Pseudo Output
5c8f183009cfb9bc4bc5f444026156e2de455de9fb6904a4fe4112ab40024a21
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a0bfb172ba45a7604c1b11d672b561b82727a115eb44c1caaa961d7ae4a1304
Commitment
b060915cf1a80d7953ee92147fee8ac9cd553a50bbaef92b3aebe3b4d313f676
Range Proof
672 bytes (Bulletproof)
Memo
d29f73bb88b7de03b85abb94cdc058782fd7439e366f5295ed0b234269ca8511a581dd04a57c07a4d2434290d244ce6b42633078d89819d0d41f78725f96d5b3e3069da2961c44bbfc0a8b73b9d2d2703633fcf643cacbdb864aea1704b4a72289186c2ec570c06904ed6baccc7f0a8c6057a62dcc210bf92ab0a43bab4275cc (encrypted)
Stealth Address
721d7f99265df03906e5a6bf79e262841c1cb977f3296fdd59ab537aaa5d802d
Commitment
645a36b398259c044cd6792f2a1d501c2acdb8e948c9cbb1127e010e2412300d
Range Proof
672 bytes (Bulletproof)
Memo
6bfe51e05be5ee36c9cac1ebfd895b413a028276b4190bc30b8bb06a2f6c2e93d5d4208bde70859e281e457b920f1a03f47047e1dc28793cc43bf11f9ce8915c90a84dad9ae64f2caf02acb7cf568a020feab9f7457010eaadc0b9faabb513b183aeb9b16e48346737cd2dc2c6bd263554a72fe8ece426e03ef68b5106021421 (encrypted)
Stealth Address
1c4b3810e297cfdc80e85f0034ce68a92407030b96cc90d30fa1985dfa404d08
Commitment
6e75cd0b7ba0e36498e1d6703668b7effc9036059098a7d4e008ee39381a5e18
Range Proof
672 bytes (Bulletproof)
Memo
61e37bdc47a242ac9258f74a26b3654783f06f1690a1f7f2997a75db670bd2691243eb439b971e8a841dda25092f0be12de977f4f862b7bc511170ad6afcc9f3a3b803874e176f9eaf414abccda6b5c41d44c113d3b8f2e3abc029e4c9acd05b9fecd398a230d6ba6f1a54244adefa7adc1ed2af247d71a863da1b256a62ea5b (encrypted)