# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a1fd76af39c52d4611259253b7110bd2d81ba41cb7829983aa4b5c6fb590507
Pseudo Output
2c4f6b65bf84503743114561743dfc8f86c10071cb1b1acb0bf31295a2dea006
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
08ac650251c8eb6c856b8cca61d35b6a480677ffcdeade54c80a458780ab0a59
Commitment
5c382ec3689f870ce28ee50ac2a8cb20e4366304f593afb482efabb393e71862
Range Proof
672 bytes (Bulletproof)
Memo
d7c584fe6eff1ae2ccf186b87ff1decc0990e5ce65ba031568ab0bce70b2142f48bbb93f3d345ff30a96b2928ae79ab5601bca912e4d190f37b79446152ae49a619f7a81d4b1f70defde8b7a6f9af5f0fd972285debdd05b4fc6c69b6becd8512ddecc0828517be1d926e05c37fe173ffa9f2096315669ea3599c4fb17788078 (encrypted)
Stealth Address
302959d6beaa6b50226c661542fb5f0bb44efb485aca4b0a5ab9757a9549d170
Commitment
a0302a30f9c271b5b272a6950037ba2c5f2d7066b99a342199e17bf81ac84e6c
Range Proof
672 bytes (Bulletproof)
Memo
be58522d5706ad3732b4a233cf21b6821bb0ca4f104fbc4fd6e538c3d04771090912c7f203168e5c3bc48627b792c10a2d4156c34f16eeb63996e7412dc5ca88711485455962e17907a834e9b38085256ebb44ecbacca81cadeccb34ae593c60052a4be936fc574d66a3da2e9eb61a2c21ab0175834726703c42c9b8cbc778fc (encrypted)
Stealth Address
326caa7f0bca4049ebe08bf582c7409fa89c44f79c28552517cf82baf9f5896e
Commitment
a49c533ee9e412d4c0aa31792701d1c14dc017ea8375c832e708895cb215305d
Range Proof
672 bytes (Bulletproof)
Memo
682d29a6d61d9ddb553119cd63fc8786cd4fddcaf74c91489aef7fc5051e4a17cd29315b3da0b7db620200e6786f161a0eb9dcd996f373a072a93ae689273d60fca3adff132c6043b66bd11480af4786b7106ba1ff018c505bd87fcecc374e32714b9f3fff2a5c23bd375d721f8bb5ba403a46c16ea849c61b2244228d23aaa1 (encrypted)