# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4aacd5ecfa1bea1b0a9b74c0036fb6ace8fb98f448d1b40a4fab3c5ee53000d
Pseudo Output
2c1ac972e53fe3b51bdf3744a63ef4dcca99b4be8fa557a7a9000d229b782f1d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c6cac184547d21f195bdf3767c06cd02760d7a9ffda52150ec75dde2e1c82b62
Commitment
02c1ab015c890af2fe6867b370b894d5ac947084838886febc41ae6b02a5cb55
Range Proof
672 bytes (Bulletproof)
Memo
c416dff4f4e7198274cfe11b42f8f5634eb987ec0c33029573cccf2c71665ca69cea97b1d225923935079e1adb565578063d53920c05794b1b7c80af8ea628589ddcbdc1b4905f4b0bf1e85e91988432cfaa54fe899865d7df27de115e0549094668d0d52bf6b312e3a57b8a284ab480c250e508471a73056608b40d5b89daf7 (encrypted)
Stealth Address
3459962f77ae2a75da7be56c7083b645ed74afc634c204c3bf9198e2344a4b4f
Commitment
96a418a379f0cb6d9501f83b5c2097119c64d1d1e8cbc8cbef56518779ca6d3f
Range Proof
672 bytes (Bulletproof)
Memo
64411f37a211e0e1959e701046b14bd9a0c48da11ab879840b3f4a3ddfac8154d5c10f0ea474b84e0782ae9ae50957bbdd4a416f6930605cfea12d7c2da63cd4b1781f2e3eceef9a5bdf37e28a1bcd061445a61ff9befb5ca1d10f70cbf9388af583662ff9c46d76949df1e0842720575fba4e6e1034cbdf7ceda8d58ad2b3c5 (encrypted)
Stealth Address
00857a1495441f0c9ff8cea5463dd82327dce9a0632288bd849de7369837562d
Commitment
5a6478ea29ee73e407e2716a3bad26e8ec4874f48c2fc945c3c00c782b73c729
Range Proof
672 bytes (Bulletproof)
Memo
ddaa00f49a0e34b30e40bbd0abc4192d8f7a508b163a04f38e5fc2e8ebc5425343bac8ad151d3bd7a699f17744a6a8540e04013a657ba32fc4eafb0917b28515747c8eb8b43a1144a991ca83f0ae54838ddcf01d5e61c743b9ab396368b43ec0fd77953112cd42bcfab785ad3c21b2870170668ac73d6e1979a3975e0fec7632 (encrypted)