# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0ec7205fcafded9c43a0028066788fafac7d0b31387a1896463329b01e2c427
Pseudo Output
6cda372fba2b9a9f60b6750e594f07cbb618f97296918fd35733e3f8da147208
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c0bfeaa7761768835324b1de68be3fc70a32feb6aad3be1e6074ec704aaa3345
Commitment
d8b7a9a2189afc9dc9508634d2b6d490f890f511be322deb63e771395ad46511
Range Proof
672 bytes (Bulletproof)
Memo
2972bae4b62fd734649a90f5bddadee844751ec75ff9121ef2c9d0ef21526f2f0799d5078c051cd358ae09b5e3997e39c2b2a8c63342573e1f102e9abef8e76786dc9c3068c5c0ab07a41f48702859aee3ce3af9b48aa3dcf20354f502a9073298ba03047e0267bcda6d27db112b7c54020e8cb94b2f7832d53204be69ea5bf1 (encrypted)
Stealth Address
f4e337eb5d69fabc756059548d47c1e310ce523bb49f55dca8d3ddf337e38d49
Commitment
4e50577282ff379eea11f2919124e939c091a3c452e3f94eebba4f861d069d5e
Range Proof
672 bytes (Bulletproof)
Memo
bb9dbf333aba478c90f8a3403a50b19b4a01712484297c1e38863ab4f4bc9487abaaadef7782925b5b47eee94bd0508fa24afebf4f275c34e235219124ac4b66ac3a4db2781c73b9c3940ddb1210ea864e5a562ef1951fe7b0f5872b8d8d15bf31d4ef1bc244c35e4e19f4755350978beff4c04898e86a2c96a9c4de036b5f13 (encrypted)
Stealth Address
0c16eb432662d87cce32e030d714d0be328f7a16cfa8fa9a01d5fdcdc333f77d
Commitment
eed7c8653795e0294181891db1ffa467000a5d3e4ef56d988b608c4ec329e555
Range Proof
672 bytes (Bulletproof)
Memo
6bd9f02c30bbce558c066ead06e6523561c58f6e6ec220d32fa54d8ed650bd6411defe6232186b20bdb27436bfc5c708db02eedb71ee88670a07cc991e0c8b21e899f23e14b184d52c0c4580b288af059113889afd01e10752f368c3149ee8af4bb660ade177055941f09711a6590a0f9351886f643712ae0d39d7e7e1d6a482 (encrypted)