# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cc64bc92a7c8cc2ea670a4d0c94c8015635d8345add3a30002e1a66f9dfd9522
Pseudo Output
981740691285bb3e0107c098c9e7b15d32ffe6923f6ec3cc2db1e191aa943008
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e0e792aa670f4ab2ac45339e4300ed0aef7b22d6adc425b0dc9cb0386d56f31
Commitment
384830c705643e7a702ea7b14fd4f1dacdae78ef03385cd30f39e4c0cc44450c
Range Proof
672 bytes (Bulletproof)
Memo
667a779860ace1e138806f1a44e6c9a1ae1c2f13a2bd594ebb73a08dabc3391abb1bcc783c210a60bb5f37ff4daf0527cd21cb870d3065e6c6ee2d40f5ab786c16fd8b0ac2f2f4f3714ddebea6d5f0e726ffd1549b4eddd911084f02700f54bad83a1de1f833ca2b0fa766e7e52ea7670edd20f36a00d64c2f263191fba75d53 (encrypted)
Stealth Address
b244b5dd0ad88236724e46b90540e4bec004b77816e5a6786395499ffca4ff22
Commitment
ecf83db6729ec63dbf4677f70dc0bcb40b767c87d63e90c464715f1c65467442
Range Proof
672 bytes (Bulletproof)
Memo
145e05af7de002d120ef09618c721bbedb00fe4a4aa98ff9f858a8111a06a80f46f208dc14408a9ee7fc998ce5da8266e7fea25d978f4cead5f922130bc3717d35d1dbf2fa8a1670f8e819ecd9425bcd9ef4c5d89240966a4d50b0a74bfb8cab69e5538644c1c6423c0dfc78c1927164a94d31863cd802530efdffa437870f9e (encrypted)
Stealth Address
3022af298adb322cd624265cffa87bafa63233871b469c1522a36590d32a6a06
Commitment
a4f7d6ca6da35cb9843698ae5b0795a2ac834a17395713e2d0aeef092d115f65
Range Proof
672 bytes (Bulletproof)
Memo
5ba9da94ff30e5f23f53d9b249df564c9551ba98f8de3fe9d7593190f6561b1c31046527aabfbfdcbd9554dcb63aad401d444e026bbe4e76dc75d6a24d79e4f3f694534ac847f1db354c4ec214cb23478ca1169599e7daefe99151da3033b561cdcab74d2fac97cfb014bcd1bf6ce792bbe9509a23540f3172478f63522bc814 (encrypted)