# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dc5ae09c8de458c8b60a342bfb4008ff568c38b7a114ad7e8ec568559bbf094e
Pseudo Output
dc358f554d898862bd6678599f03455e21313669c72f54718e487b6aafb49f03
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cc186f9ec89c7ac7c948fedcf9d1a3509d194de282f1dffeee86f8b3a4ffa475
Commitment
f42909207e4c5be76029142262484a63f439fae17b058de05da77409e6a96d57
Range Proof
672 bytes (Bulletproof)
Memo
671751901e74091453c7efb8e9b1a79f1894d33bc5b2dee9e56bd69fcf6f98f71630249bb6b89e2e59fa47d79ad79df2c588e5e331db5fce037bd7dd615bff55cd76a786a430733fd107aee2d9abeba17c117eb4982aca8a25497865be7d021a53e3b7cd5d6d2b5e2e9f3860f3b65248f0ce05b4e358dd3f7c6d8e66aba66849 (encrypted)
Stealth Address
e84738eea9648f18900475c34369de476f887fab99ecec2f4597d69443089825
Commitment
58b8e982023ea3b04c94ffab19cabe2e3142c873ee9c2580d80a888f667d5952
Range Proof
672 bytes (Bulletproof)
Memo
5d8cce9b484294a61836f2ed2ef596de7098538aaaebf5c804d174b7f7db1a69e95acf131773263fe396fc704c944925076cff6be0ed7acbce48c47aee69b04aaeae921b4586432d063387e8a48f3b4a1518f2a22a47a669142a6824841f1980d604d405e03a0e927985812597a31b96e29fe8a482734be4aa9cf9d4b55205f5 (encrypted)
Stealth Address
385369d06e7d07b2df99d05f5d840e27b9db51699c961d77658cd8920fd47d51
Commitment
2417109c925677d8c3243591ab899c143011c4d9423cd9b85098a8c232092322
Range Proof
672 bytes (Bulletproof)
Memo
959382ae9b7fee29b408aa1d9ec66dc520c0ef5d9ca4dbf7284b746be9d368d288fd5f60c39a4b92a199be1d7adddcf4f89e831270136c5e332e7e475112a47684e80ac97de9bf6d755930e1d0c5d061c1c2fbf6abbd2b957d5b1073d618e62aea17a4a504055906552ba610156ac1e8b2728ff71f72a5f8e3afe06a6f25c9bf (encrypted)