# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1c7791777d77e8816b19d5eef8244bb26c64dfdfdb91e4bd1b9febd566527d11
Pseudo Output
10c29a200ceb56ba3ba596a15b83e9e24b346c5498d577f276e9e1beb80bea54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
00cb9566c7c1e8862d9c81465179c83963fabc8fba16a58561e568c3fe543f24
Commitment
ae3c62025de4aa3debcb0215cc40a7ad130f82b8ac0fd99adaa711f1fca65413
Range Proof
672 bytes (Bulletproof)
Memo
c1ad4bb90f8d0b0ce982590f97062a11d3367f58abe954d11dcaa977c818cc425bd2ebd4e39729da3b816bed04854492c2d283ee5dc950223da23fef90927dab9fbdf652733bf23086aef713892703cd36436d676aa9522602107ab56305a48ce651287c64cc37c468036e54bc51fc0e75f0f94030014a899f9ecd353e3df0ac (encrypted)
Stealth Address
7e142459a96deb38927033eab02d6041465bddedf81f65fbbb6cb3e9c4a7826c
Commitment
129aa492d6339a3abecf3a130246b572874f3ddb1106835cecb1a60f85083c67
Range Proof
672 bytes (Bulletproof)
Memo
96275d6b72c79271193e80f14b3dcb018ca8553ad92fee0ef0ea72d0c78cb7e1778e0ae5e2dcc6d9c17edc6eee4024c369fed615a83064933cff3db14e6bc0567ca58742afd2a44a7e3e8ea0300a45e26a9f4379b5941d7b38f49ae9090e3593de7eb2496e80b9e7bfab8821a04974f0009d1d4022afc917dd3bb801f464bc00 (encrypted)
Stealth Address
645d04a54dd00ab29afc19e3ea033b17f4965a1fc0888db37dfddefbb023eb4b
Commitment
78b654909af7c60029b78e30939de490fc28e8e3064b3fb260d7474e034dba0c
Range Proof
672 bytes (Bulletproof)
Memo
09d70f20bf4c21efdb8c83c4bf30e6107d536e32860b1cabe9dade628db5f70ee0824e45c54c6bfaeb96b5041c64ca101e2d9d8704f77a6217334f9831d624a4f5cbb79a2baac0e5505864aae7c6fe5a046cb0e947a4a49dac9c8a285b00f85412811bce47d120138f3d95e157c344b95b4062162439aa4cfc32956507e04676 (encrypted)