# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
901a9e62fad7481dbbd6941ff445ee76f4290f8ca37b08cba80535174eecdb3d
Pseudo Output
3e1dd3af56c4bb434a7dba0dbe730db324f7284712bf6c24dad6d21593a16a06
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c2f9c52930de386d47734a652af6c84eef48882b1002b4ed27aeaf669b7e4e41
Commitment
b4e3277d03e7f129fa8c290b12ce59135dc0e7455796b2ba9caa003faa290c20
Range Proof
672 bytes (Bulletproof)
Memo
5e2b0593049730172c82f9bf17cb14d5cb22983d28dfe9a06db8d84cac2a83a617963db7b37334f21450fd5300467d7341d2b6622170de1b91812952afbd190390f6c59dce714f54f3e63c7bd54386302860c01ee02ec5beaa02343969ff3bcfab84e895c2e434c0644efe93f8906e8fa058f87c6c0462bec47e4828e3a31c6f (encrypted)
Stealth Address
acc1e951c2734fc4c2b387e9caa8319a6495a3b1608a44e028348b2e25f77a14
Commitment
8e819b563a37226da2dcf2db9978f09107a04c13958199e84ffdef9bb7a0db0c
Range Proof
672 bytes (Bulletproof)
Memo
b99e53ddc11ff5feac5aa26f68dc63fd0be984ccbc73ec6b38c535117a3de7d712f86c61e97ce23c11baf383abe9adcfb61def91f9d7430b57c5732fe36a3f2ec4c9f16203660ab6437c4a4cf59e36a9ea3839e56bdebaf99b17b29754f1551d6781b1bdaad1797ff3c06de4c28aa2191fbd02431036524a724d1f328cd2a8e1 (encrypted)
Stealth Address
cc9c6e99c1965b11c33142df62b1b8dc1dfac281361a56f569d5e72470b6a01d
Commitment
829e4d15330575339648b1454bc3339bdca6d11ef3b8f7480b7cd8e894958535
Range Proof
672 bytes (Bulletproof)
Memo
d172b8f9e2b6bfd56dca760ecfedaebc5ff4dbe6a87c0f8805a820ef1af6dcf35c209f5eb10f8e34d5069db7c65bbe74bc5df5c3563ff372f8fcaf3c675417203155c00b543a75a67e5f8c2aeb4f4c67ec2de0d02f7079814596dd1d04ad6a66d613359c3c1904e669b4efc4d12852a41c24b039423ddca6df25cd36c6509ef6 (encrypted)