# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f83e245bc0e89b75c2572f738a057f9d52ebbebf5c5fdbf4666c75e16af55401
Pseudo Output
dc12e5d01d9f9d74f22aa6b6f9968790f245ef9c7a52ed961b9f30818c062066
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c8f3bba1d9538b72b4eac890ba37309e3d2a1ea671181a3451edb4fc9d4a3c4c
Commitment
16ececf851b9938b62e5fe7686fbf914df1d335d730da6c08c44508443711755
Range Proof
672 bytes (Bulletproof)
Memo
12e78868dd964b4935eaf5bcffbc56341fee3e0370600f40f3c6b3cecdf6b475604edaf8ba29cf78b0a6b7def09bb28ce3138cad8b991678e107ad7a87997c0f37180f1ec4533bace8a3202ab97151fd84add9846c6a9e0e7b91e768429b8461ebccc8be7b9b2ff26870c3f732bacfd1c2c933262749a289fe6eae29565bbfcb (encrypted)
Stealth Address
a2e434e50d04a0eba5d0c683601822c9cb7b6b199e9edeaffdabad1e8e608c69
Commitment
54e8acf1b8ee8f090db70464a2b7254a1495f574751fafb899cc048d30a80131
Range Proof
672 bytes (Bulletproof)
Memo
a01dbfd7eb6e3e79b4e44de4de3749e67c24ee81daeff0d4d175b17eb2c92b1d41aaa9a05754841f108fa91866d932fd2f8257fcf65a117483b4166e238eacf53dfdb3a9694f54a6d632ea0e506ca5cb9984a8e9dd38822af3a6ce4c51068f3e6bdc8d49aa351065323acc6a67d5330ef457c40fe018de6677297a0ffb637bb8 (encrypted)
Stealth Address
34fb69a70b6a5f80f98bcfca9d27e5ca8f977d8d79abb84e52fee6dc2e46657c
Commitment
601d6541b92404e815b627fea20674b44296104bad2b7951003ee36310bf8004
Range Proof
672 bytes (Bulletproof)
Memo
31b2ae7b232bbbec45c1f8bedf5d80465153410b712626e5a259e4e6bda82743fccbe8aac923eb676a76bf0d5ebcaa3d85a17975ea98419bdb75f5032a2a59e3f6df744adcadaab272316e64d0b9d1cca138a6e1bf06950f2757f856388ff8355ae222211e12cc498400ec8936654c27e4c6b461995eaf6932e1880ded5c91eb (encrypted)