# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
961f363e7e06633e60baaf2d10089dd3e7052f3ae1a2e860b9bf91fcd01c6401
Pseudo Output
e06543dbf6efbeefb839d38de6b54a45b9398a16809546eb93be04d42d02d021
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8cacabd2c7ebf5c816d1ac51d961bb4131086d82a33e4b27c229773f877c3e72
Commitment
a28786a1c04a00a5b3f1fce97e5a1a8c3eec2d284466ed295920338110dfad52
Range Proof
672 bytes (Bulletproof)
Memo
da6658adacf1877c2ccb5d04db8086bd5cd685c036c2b59d0964b4c0ee0e77a744775868e464d9714c5a663a8a93995a89eb9214a9ae9d48f67bab0b3dc77641ee635146a956c245eb67c3f697be2a5c3299bfb003f928c9a63585cbcf027bb50620590e270a977cec9aaa87e50067cc051d1765c90fe36a393b310c0b64e9b4 (encrypted)
Stealth Address
7466fc8dd9c11669de5f6b980c7370a3af79beffaa3010a48356dd8b0926df20
Commitment
c8bedc4f0d0b24dcdf8bb9ae63585eab9199bfb4844b32de9da1f79ded9f3456
Range Proof
672 bytes (Bulletproof)
Memo
2b76f292f64bc3dd5bedb2bf17fc9aebafbb8650f800412b820ce530e9ce4f3d5a95e9aebeff7cd02519ee616f4a5d7db4956ea2f1f9993ebabc319757abc76f05d68f6108e8df9eb3ed6ebccfd36d038297f7a4b80aace0dcc78c2aa87eda20d85095499abe9151adc2281b35104069c8b7194e8e4b09aa307ea35a54c68b2a (encrypted)
Stealth Address
7eb182173da0b84999e3c19ee95f23874f0d173da1912415b38e11ae744bbf34
Commitment
d22bb13016e7889ef8e70ab63fc07cc92be4ed0f2efd69f7cbe73e062a901925
Range Proof
672 bytes (Bulletproof)
Memo
4653d8402e8d6e09c08a2207be9bd049d536cb2fa655fdfbb76e87de3090e3af0ac0b86081d408915495ed84eec50da6d8e8dcae0090b7046e19b79a40dfcbc217d243f5e6139eff7d3c4b81c3dc2f5afa310dd45cc2803a8e845ebc2b938cdc6b41e56b0f9d2a825f4c667a33603e262e0ad739811ba38c16b6c2f8db38c168 (encrypted)