# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
04a8556d05c040f809ef9b5661f4f1982060e9f6e2b69f6f850f66b9e31a0e5b
Pseudo Output
c0978576499842799e8c4f7d27e1877fb867944f2f6e03c36b9c7b564b14a666
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26fb48147cddb2a66e16a114488882ecef668809b37684ea7cdf6f95c9f1bf3a
Commitment
8640d6a5d44e86bfe0995ffa5bccfcf5f0c6db7e15a9837b2e8ac737cbfbf235
Range Proof
672 bytes (Bulletproof)
Memo
ccd21019d6d3c7e7e75bb548a22be647319cde25ce1dc8dd512d68af22a5f9cb8cf85aaa58c032155dd7a01f7b8e42250d819244317656e1a845eab0b19eeccf7d72b970610e6fdc730c33cc6a2f5244490a8b00ab476679bf38d5a9d516d5fb6ff371afa44a97aeff880b0e87bc09537e3200ea06993baf5c4cd3d79b8664f6 (encrypted)
Stealth Address
44f134af728cb3851923f62c561ea92a974de9dc1396423219bfdf0b937a5d09
Commitment
b28d3206456b8941b5c23f3509973f4ab843a91e6c2317c621ff1aadcc3d5523
Range Proof
672 bytes (Bulletproof)
Memo
a9240987ad79758daa986672f027aee777379d27eaeb922948aedf9e2876c8cd770bea0fd1b468295546c51eb67b5ace68efa01fa2be7f7aa51c745a957d378b21b9e50b367a6dd3d92dc01495dce8fd472859c0232956fd9902ed053e3c62eddc14b2dd1f4f795c5ed728fb10ee06a708e597fe475003c71a4f32739fb987e8 (encrypted)
Stealth Address
46b8481c2a7a9d470deba65bc95de3ba1736a3f2fb3d7b06c8437ca009d0845b
Commitment
b0e13884dbd7841ebd78fa5ba69ca377596b81f900415cede8d98d76a296e933
Range Proof
672 bytes (Bulletproof)
Memo
7c883063531862bd5987fd948a5bca66152b95af2ab9ba70e1a6d127fcb54657f32b151f766c6d5c3b7934a9c6dcf539b83dbe241bffa66e1bdd490dd75bc679cb9637079497c91db8d14a8eb9854143df36c6989a1ac6cbef79b5c5879e2c73ea3550eeaf9926e171127fbade07ac18a2f9c7c22bb1720b0187bc07168cad1b (encrypted)