# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2c6863a75c2b2665f205c87f813a97d40aa752f8f1927c78327fcb2579838a75
Pseudo Output
205eecf61afc9b093b7666b906eb9e5467b6ca5ca26d68667ddb26a16cfaf203
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c26c63bdcb6b7a4a2be0e3dc5779a5cfce66ad01538b47b397d6dfe8cf9db753
Commitment
02b0974987cbe0b0969c9ba8084c67348fb444f8a697fcec42edccbb4822806d
Range Proof
672 bytes (Bulletproof)
Memo
bb2ed47b6de14c60a1b1a4f3f12378def5a1765a28b673f6c58ed77c1aabdff51bc017830d4c7aaf6b319cdb1fa05e91afd56837997ec3a9c2939a339394f58f18d4791aad8e503425e99d3a095afa418982c23232d095d5fc3e2094b420caa20844a4afa8edb4f5a7395d88aa27511fb9c2c0c1335b8bb9200573f19ade592a (encrypted)
Stealth Address
60cb61d3a4052006cd835a9af51db53f436be5427512a232502f27c26a5a2c7c
Commitment
524eedcd35063025138e4c9a1e8a8f875ff0707c532a5260fa99c14349875949
Range Proof
672 bytes (Bulletproof)
Memo
0ecfeef67da208796d7486eea7671c5ca85a456540ae53cf5737368fcc16c3a2cf2e4d8544c5310ae144afaf82382c3ca431806205c1619c5161ad43f22ebe5a98b0dda0b4cf84948ea4694f7ad027336a523e9656dcab9f7e6cc4047d42a2516c5a7c42c9cd5bdce35e7032d2b681af52cb7c025ddce178b635cbb50501d3ef (encrypted)
Stealth Address
a6957711954c37487bc91fd852f70c926852e1a809f6f20e9b54a604f6afa727
Commitment
b09f2ac36341fcf3212aadad076ef9d7d30bbadbf35071e19279cf600fd0f426
Range Proof
672 bytes (Bulletproof)
Memo
a6d2ac3e1186f52a1f6d7d5b5d19dc526c6eaa8948b6e8cad219a2255c4e4aab50bb4771403ddbbd4308ddd0fc6f6567fe172efae64ac65340b6f158a937ecd4034159ce8e78aab23f83094cd0046381971e8d4ba380ee8c6f6e6437cbde827ba4449baf7938f6b598e5d3be0b940733d485fa6be26ce80055746adc7177e8c8 (encrypted)