# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
220c625741676916e066c78578068d83937b4250a0388cf7863223b15c39674a
Pseudo Output
4ce9de211d9e9e2f241e2485323bc57ff767c35ba63377f7570a42507c54733b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dc1136ceaba8daa1234ed7d8cfe0086046ff6bb226a8a19dcaca8504707acd35
Commitment
0c4bb74fe1adb32b33f870f5afcedf8f10722078633989c1f3cfcfd286261a37
Range Proof
672 bytes (Bulletproof)
Memo
acfd553a5e28d1d7d31f0f056815e33533d2975dd94f00715bb86e4b2f05e6042630f6e734a21b27e881cc9d2a3f8033d93a9acd3bced171a0b1a4507adc86d1d57485ce27732b0459e01dc54e4546cb6c81dfa5efa147ef22200be9598d5f6d7797a007b9f240ad34e4b79363f16372481658ed6a00cc686bdd56f1d65c79d2 (encrypted)
Stealth Address
36ae317f2e54da08fdd6e5a764ba1de165f0aee9bd8b9476148a2872334c4f77
Commitment
8e992c9051efba99c35273db90790f92989fcdc360a10ec636beb4231f9ab33a
Range Proof
672 bytes (Bulletproof)
Memo
5ac3c9b189569c315c9791106eb4feb67d659f53dd1c67b4f1b070c285a70f92b550b106539952721501fe66bb858c6b19395960eda47b8c638785904b6b5ab3205729aef83f6349a7f225bd90b2fd76fa6c797788574ffb40edc5636444d62300d1682659061b603a0a682d8a0fac95cb14b9acea6d63acbd9f8f4bab3831c8 (encrypted)
Stealth Address
427cfb61b1d899d1fd8cf158e13e48bdc05f5277a6ee424e82bdebcf71095a0c
Commitment
4e25df16d7084838645dad9f9e39f2dde74656d8c2cc0893f1a81520ec7ac972
Range Proof
672 bytes (Bulletproof)
Memo
77d5fbbb79ec97b34d6e078c5a92477f229b73d90caddcfce3daa045fc601901877d7081dd1146b3aecd31ee3e86c75f264dc12e2e350531acd03ae6ca3f872134e80a2ed8f5a64a64fdb87599c43db475c2047b504a5384f0c9dfb7aa86f855b1b98531bb32b9abe57d18422d854dce412e16a952fadbd538ff876fe009ff50 (encrypted)