# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
18f908829f12f4372afcc9325bc9ec05091fa41b4e3a51245f63f0eda2a8200c
Pseudo Output
7cc655ae98e7e3d514f12b112cd0b26939b3fb95f1c6ad70af8c698541b63b3c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e67520d55647680567c0bf7ba7b72c1142a68377133eec7e6714715b1abfd756
Commitment
acca0f0d4cc6082db87e4b6fcb5f8101b1c308fbb606b5ba2d2ae19359429f1b
Range Proof
672 bytes (Bulletproof)
Memo
f11e8aba2e971d6a8b9af529a4313a7740d7480ebff32f16d117cb6d2c6dd8c946cbba76163a2b5a3fd06ac299aecea24aff4394c289b4c88f1a8c83aaebd556e10feec7324cde7ba16159914f1a9a064c7ee46d371bb9fd20aad8906d1fbf9764fea45105ba1dc067ca4643aa1c429fd654008e0ed74d7e3eff298c26fec5e4 (encrypted)
Stealth Address
84a2b70270cc9b77dd3b31c7e235c4ccd280430bd63d08b8c93eb6222709ad0c
Commitment
20222253110f910a89fabd96513ec7bb050e01775f4667adf452ed3e58d9fe1b
Range Proof
672 bytes (Bulletproof)
Memo
68ce29eaad66c697e6c0ca9bf6aa94f9fa8b1d70965c4e392dc77afc49941c42362bbec93ae0a53fb2b9aba4ac7f2d6e89fb64bfa7f8b143a12c8eaf3c7deb3ba9689f5b79de4f47cf07187b544b0d31f8f5f09dbbac9a422846f575a05d8648d5ade46e18aa7157519b69ea5a94ee16c885fa79aa2e0b0bd26d251530b567b5 (encrypted)
Stealth Address
20fb2041bdd509a549c78448d878be9b6559865b3dae6bbe3bc659689a40fc3e
Commitment
5e7bf737f1c64b0b7c10eb0afb059b6696ec976fd05491ad22582f2c25a2d300
Range Proof
672 bytes (Bulletproof)
Memo
646e5864d2e54142569f14e07158f6cbca0306336e11cb3222933d241a777c15cdad3eef7389d98a61819b6b9274f2519888c77268b47b1a3721f9db6539cdb502109c7b27df8247891ab0f141d80bdac9ca7f94de48cd495f1d16625c8d0acd25714e36be1e9800cc13e8ec896ee844a7f7c518403a0b692168047bb6034344 (encrypted)