# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9aa076dbd2a26e278754a385992fd2b336a42a7987ad08e9ec434f6a6a4e8c11
Pseudo Output
d294afafaf69df862ab0cde30b81c1b6c149559b578169c03bb331ce1bb8e049
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1c65064e5d5845f98a6e7ef42720c75da48c0060696c9b2bf470315630502018
Commitment
b6ffbe6e3fdfb3562491ffe44d47f1137cc90a5e7c41d3aa559e2d4cd5e45577
Range Proof
672 bytes (Bulletproof)
Memo
f6388b09e45d061eb5fa876f2dd76998f4c516ad6edbaeec653bbe5568327c8be64cbfeeacebced34ae0d28d5f0f692d94d0978246bad55aff7ce155dcc91a10a56d1982bbca119984835359f718d95162534bbdb1305a16be23034091402d9c0de15de7115440be1a33214ad03d7947169fb28c32d2dccc288d7bc7819502d9 (encrypted)
Stealth Address
70c6bb31cc51682481d32350d34ffd5a68b6e8ed9ffff749f676c4bf04d95549
Commitment
38289fed73b784511949a5b1fbb23a40cd8f2162e13cdd82bcae5fb8c313e715
Range Proof
672 bytes (Bulletproof)
Memo
18b01a676ee4ee4d55ebd65499343f4c873f605084ae58759eaabbbdea2efc225f3f74c4e2385d452ab95a669485393f845314fd792cac725220ba40734af4523270a15b369a3cfa2838bc64856180727a0688791fcf91b0d090a8c41381c5031067c6f8ed88d4fd003e1e2c68763d3eed0870c4a316b9a6b39672272d615418 (encrypted)
Stealth Address
d60020967d64e5ea5f7178a58b62f9c160335759166dbfda3c1a45e0186c0e78
Commitment
ae6771982fa01f0bf9edfa6b1bc083593af93cc7b3bd149ab6489a5b72fdd950
Range Proof
672 bytes (Bulletproof)
Memo
7b8dfb09a9edbbe7bf460b93f36640f8740afcc63d9288c53a22af390007c4118977bd7f1e0872c5eb083bae8813bb20328e2a0ab24dbb15f2d198cc27aa825013b7de8ff889af07a138b6406f5d5b54697787409a7c819b52d3889b7fe7724ae5be9b7733ff7b4a3712779bc7a45f5630da1daaa81bd5dfe6cf5e37ab1fc4d8 (encrypted)