# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0c8d6b27260a3a5052cc470b67afb866f0285147c8dff2b9dada6d36b0cca741
Pseudo Output
6869e782d280e91af3ef2f2cd6e07cd6156ae2d0b97dca9136990daa39ae6469
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9cb616072364e3acd6d7155f242d003825c6cb0253bac4a0ad41e87158dddb16
Commitment
5ed7b7e7f3db5fe6c7416283bbcf43b38da69c1ef02535bc8f00d58fadd4914c
Range Proof
672 bytes (Bulletproof)
Memo
e6109ffce60aa9f41ee065d1dac8cc9b8401567aa6ba07c31fc66771aa9c540c7a0c8c0cc8bb42df3b587fa7d8711581ff575ac54f3f510749753121b06627ecfa17b4e51aa329b3616c42d9b81c44f7870dd401bcb46449cc6c07fd6637c7d260189e4d3225b864c083a59b808225fc06a378da23322c47812d941e1c5f7f3d (encrypted)
Stealth Address
ec716cb7d3a718efd7adc1c0d6b50bc7b0ed03b253f98be1c5583af94db05103
Commitment
5e239b29076528dd04bb81a0e4f1c0855a0674b6c9f2e28f0bec7b067fda2924
Range Proof
672 bytes (Bulletproof)
Memo
4918e4bad37ac776bc6afc93cbc1ade8330e9273178a7fe7758c1a252557b146589f91acd7b53d701b28ed2a7cc747d6f985d33d877e8bffa6351e9a4498ecc7b5c3e29e630d21a4e79842f3a54b3944ee6d351dc40d5d6331f2e6493090f688513185513d27976ea69a34042af8960f235cfe8e24c0be1676b2a5328b17e92a (encrypted)
Stealth Address
c27a41f744d9c4dcb66e60e65326797e2b3532d02f63098f9662864bd858257c
Commitment
c6bc395885f0413195b32a0e68cb71ce3a6aac9476f6e8fdbc3922a4850f9c56
Range Proof
672 bytes (Bulletproof)
Memo
e6837df3a209019708a72cba287cb7272daf04dbca4debfe484b641b7569a1840da51a6609ea6a9e75e2db4b4b4555799c677ef91f22d61c380dd680aa7c9296b25ae405924cfae9b9c8549e700c11819dbd6c2f45fd8c531597c09740a4340111e7eb0a088e03dccd5cc435f2f061e96855f27203fb0cf34594e93ab32093ae (encrypted)