# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cea65407614bed1083b646b7967a80afc514661d8058e8ee5c4317e97a3d7263
Pseudo Output
26c592b53fc54eaa9f379481815aaaa440e25dce643c04d1dfd1311edbdfe733
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9cbc0d1ea395674dca3eac9745246e1167620c82678de908facc0cdd87c90103
Commitment
dc61cfbaff192c75861696d960172447dbac895eb3c9cfd17ee7b1afb2c1485a
Range Proof
672 bytes (Bulletproof)
Memo
ca56d784c5933b30132830cba1b5147039189546c09634dd4ac6beb538e670f2a8c4abd6ab01c20a0c3f4707b1a580b3ca470dac8449ff9185cdc546ce26ce665542bf764d635c4a64febf94effeadf22d661623b4ef4bbbb28819468bd4e590c648e1ef610750c86c25973b466bcc928adc8dc212dc1fc5f7d50b770330ea25 (encrypted)
Stealth Address
84b9aa8c477cf79713d6c7e2e505a66cb75146ffca5e68e20d64fc34185c720e
Commitment
94efed44605e92ffce59ac8f944cfa8e302da30ffb5608a00fbe07cfadea2d67
Range Proof
672 bytes (Bulletproof)
Memo
9b05aae6a5db80568a4def9f8342f3ea77bb86e3f4f1f5cf1820ff9c5d8547006a1efd8e92fe0b4ff131ec1aefa921b8e97994a44b62629a6fc8f431505faa51c31995a96c93bef04753b03b130de98c7376345467064923ffe9f43b3f3cb97d433f7451e76d7fcdc57230a5c394609f112a8e2177cbe1c6fbf470481c82ae5e (encrypted)
Stealth Address
30d65de5a205a0cde9cab80e989516cfbcba7ca6e7f00dfe67b731143238ef3c
Commitment
def13245078cce4b80c1a53244bab9920c13c5941a8ad1649ef1781b7102b941
Range Proof
672 bytes (Bulletproof)
Memo
295052cf997232ea96dd11da729b74113264e4b85fdf55cbf17caddab28588a284eb818ae14f11baedc2abce74ce5f2779ceba1576c9bb0b6230a44154fb051739d87a2d8e7bc359187116ebd6f7dc8c8456eee9418f03c64f0b02c27b1bbed90e33fb965522f46d7302b990a97e747e0cb796c2f27f9e6bb87b1a4bbe1402a2 (encrypted)