# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4ecc1377a5679da7b9a66a0b5d663d324fbb88441e5482b4641b7ed89bbb914
Pseudo Output
c6aaf847715fc5bb422fbeaa39c9ac7e7259e2e327a71f1374dc9670a2caa01e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9acd113e1f5ed9d88213b432b07a84e07045ec6210ad9a64ecc9ce1bce061378
Commitment
1420cecedce10c298b565e6954b0050f72bbd0cb9e856a4d653417c41b4acc2a
Range Proof
672 bytes (Bulletproof)
Memo
3bd58a4518ae7ef0770ca05e5ac82472ce7a967d2fcc9c4661329bb336b9e5dbacfac45c776a6b12583846164e59b5d9f2282ab7324008dc2475d68aea3b9912a56a9dbd6f2a289bf0e090210d4bb3c749c55901dcacdf18bda907375a95a0d1da4bc3b52f003469c5886c2b89f776e99d3d9104726a6fdb97aea964934d4005 (encrypted)
Stealth Address
cc4daff5e07bc9a15b82e0da7230edb2a369d26969ccf9f882d29c862e77b073
Commitment
686a9130284d1bd34413816baab4c70869b7614923d7f3a57fc02b15fd832335
Range Proof
672 bytes (Bulletproof)
Memo
d80234d01c121ad17b1863ce6cd725411be0dd001354732a759581afcefdd2aca2f139050842f664a80858abe61cb6d5a255b74554a52119aca87229d32644387878b29bf6771ddc84ee38944c3e48b794213a66945bba33a37eed39329296407f670cf985b2ae7339a81de3e1577d20dae86d3b1db6d7013cd1c0d9f59600ad (encrypted)
Stealth Address
9ece5914a686f7870149083e1b2034a21f38fdbea0440ab41af71e113513446b
Commitment
7ecacfd2a514d1a3554e0ce0f5020a3cf887aa9c7f545e9bd3c490da2eb6875a
Range Proof
672 bytes (Bulletproof)
Memo
c59289bf103c9f63ad61764954221f1417e9a13222293bbdc12a8853c9163a7f800d0ffc1cabc5e4ec9aef5d00cbebc659e711200b31db3a731df9f5e5634067f2eaa4fe77c136079c52444f0f9df66894a33f70243170eba09698877b4f46bfd5c2b21dd1220b5c7714f1125812df5dede4b288bbe39269e0818c373c24a8d6 (encrypted)