# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ae8cd50a2c3f5935e4e600fa6b7b6a587ec8f5f0089ea49b2e4c1891477b539
Pseudo Output
5ed5f4c965161b2584849cb59cffe6f3ac194f9037cfc1201611f6c13d70fd20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5a6ceeec71dc781f76fecb89524f0ee458a214f9800493f05b84b0cdd0805d66
Commitment
9276578b1b77ffc393c7a94fd4a89d265e8d05165ae71199db3bf484b3c9f215
Range Proof
672 bytes (Bulletproof)
Memo
9c376080d5223c9376a8634d9e41e94f610e22376e892ee2d0035f586a4543ca033d0ebf712ffb4cc72d55b300f81fb291edc2d960c8f6a2192795a314e975fa178fdde7826d4fa273d999b99cb7b39d913bae550e5b718d6c368fa128c35e0fe2a6d69c41442a381652a45ddb43a0da1256dd11c79cd522c54fbce1ba4bfbb3 (encrypted)
Stealth Address
2a80762086afef0a5911eeea859d4f397da67e606a86ccbb3d524e26b7d5047d
Commitment
92486c813fc02feaa420fec98214ccee79a7264546ca8b9ee4cef093bee4b53b
Range Proof
672 bytes (Bulletproof)
Memo
dc27372cbf5bead67a351f41b7ce7708a8a4c5b084ebe3d8efac8885d876e9ee353c3077293a967de212c602f6110afc5a22058589a07d3bc8a4f2c43d242e1d2782941d04c1968d3e9261e695ec30b99d7988a4ebc808fca9c4b80f37bcc73f28f4ad736b63d7e6fa43de9cc99d8d7b9f2eb775940d2200fb1ce875f7b3770e (encrypted)
Stealth Address
d6f247a9623139b2f688ba080f6c272bcfe355f8ab2164ab4c93c4957f45fc3d
Commitment
9e5348e0ecec492508254918aed6d07b454068c2673371c81716a46ef6cca642
Range Proof
672 bytes (Bulletproof)
Memo
5383a964ca6a4335b66a24520a75d1fc522666f6622cae045d47736dee59752a40f6d271b953bb897eb0b327cc56faf5b76b46e1ab75fe30dafd918cd869e761dedd245bf655f185e48a175dbd31fcae37c7a363b6c48714310eb22cef942cbc25e521c1e1036d3a3f3a773c2e7fc29f096a73a23edca5a53d74eb5b18a704a0 (encrypted)