# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a2d0ce8778b8591f9fba4467ed5e1c27c57afc96d43a069931cda6f6f3b12717
Pseudo Output
da71879799ac770208cecd2e40517097e09939ab80ec59757c8e9fde10535e3f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9c7e95dffd4ad65e83b0f35dc9ba9f6c9588bfd1850a8604d75788bbb958596c
Commitment
06f9bfaed8487b8512254db41e92e02c36669d8f96cc20e7f930b838599f5d26
Range Proof
672 bytes (Bulletproof)
Memo
837d8657fccb8c3cd209c75da250be9df6274437bbf1cfc38507155baa61dfa1ac49c541630559f30d09e477451c6d9c8208479bd20db8030f71055a8e25f621cf7f6f36edde7862d0705186c064846de83dd171c19a126d9b4434a6223bfaa547bfcbfd195870529602a137564d40334bf362963814f4c0982db507cf627f89 (encrypted)
Stealth Address
4efef289f90f65b76b250413cea9a41bd0a740730ab7ccc5dacaeceeecfe7744
Commitment
5c4ae08e04603e7cc89b41e5b87efe2746109b33c99064dbe0418cb0cffd9579
Range Proof
672 bytes (Bulletproof)
Memo
1995fb7420593023e6d8893b6a3150614a80402ea32ed3b49624ac9c148840176a3731374643caa5488f011be29a6a80182a62215d9d9f66270bbb76bd67f661b8b34e48ba2e84ec468fd75e643c1ddf20f0769dbf55205aa88791d789100d5606f8a008636821e32330f08495656a37768989353e2f8a66c9b6f3ee49a7b638 (encrypted)
Stealth Address
a21b2ef4eae1dcd81ae6af2409a0515d6698a1d4400fc7f6e269e8c2b5f3ad74
Commitment
ced1bb9c628579ade5efcf05a47cd0f774f91b7109998d6afec67d864ec2905f
Range Proof
672 bytes (Bulletproof)
Memo
83aebb482bbb6d0567224eef73fb5872c742d73500215d2ef895d701f16444530d65d1f242cc7ceea2903553d10231e8d09af532c5ccdf0dea85747f2cbb6f80abccb6872ca0bedbc3fb4af109276a5d396c25738cef1226b72b82677c446371bf6570947cec13e4946d8be4f226d6d1e1bce76321a9a8229d8b5b2c4d1571d5 (encrypted)