# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2c96fbc4e7cd7d31d6fc1c659dc5a4d1a108a8bfd295cd0e2096fd78f6d7717
Pseudo Output
444ebcf8bed9eccccecb7406a855f126ebc8e9366870776f3a4f9685a61c3236
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0c02928fe2cd920093eb3cb18ca06f3ec222e5e29f2990425e4992d4ff358502
Commitment
9ed717eaf12461d95922535b9e65e48b40880adfccc04d7e011d3d7f06c2a436
Range Proof
672 bytes (Bulletproof)
Memo
17b75d3fb4c9a98751c2af44db4d02009ad8e87b1c51826bf292b912b704733da3a517e89e667f846fca6616eb59c2f481d7397674b611d8a18eeda52dd858392f330caf4e59c2363ed5829660ad5e89bc1237e0b1c86c5d023c0f1b1b2f70c9c23ba06930232e3851015ef53e878bae0861c8076f10a8bd5d3d0c9ebbf633d8 (encrypted)
Stealth Address
68e2f5a5a7a33935a38d11704f924a9349fd2aa6b44ce593824caacedd257a1a
Commitment
56f75c8157a9ba97a3fdbdf855d934c9cc55fe21d710dd57b74f4daba79b2415
Range Proof
672 bytes (Bulletproof)
Memo
9fe93ead63eec47ae99c618cb513e692764e385158da5d2a5d9e054cdb71067f9cb75e0243e9a387b6070d3819e530c088af59826269be9584dc90ac91568d9d39491acb6388b6063232669de98d0094e560e03c762a0a1bc09edf5a8fda536b626a71b9725628fe1a1e1654a9282c473fc377a07ce715b38d2fb85ff33e8202 (encrypted)
Stealth Address
341f7fc5819bef5e75fbcf51038e6ffa3bf052fed2e31f561e01917a67d19d3b
Commitment
ba59989afb1d0ffd0c735b6fed7aa805cc8d587850df6c264f832df941a2c05e
Range Proof
672 bytes (Bulletproof)
Memo
03e67ad5d4873359ec7025d3cdca1629bd3d31b40b7a0b24622a9c415276a3bb5723ffbf555430ce166537469d2ce6ea0c24b44a14ab66c9704bc0bb0b7aee069798ac02dc2d83b28b3fc0b4bb391d92b5c59fa8747dfbeb8b3f44b77d50169d813306fd6c81e86ff4089aa4e4937da62ab83e61ae4f168e36569a908af08273 (encrypted)