# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9cb9e8ca7dc1c2e7d8d5114b7c9e78831afb96e9aec90d9ce1bc05be0f0c4478
Pseudo Output
9a409c9ef871ef951127005a8b813127283b0006a5cff2e2eb3a1f11007a425f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6e72784d528bb9a7a29fb72105ddabefdf32bacae06902263e1dadd575f37027
Commitment
46ea4f0a76e538497f23c1407f0983531c8f8f0b08c394c7b9f5d3a84c1fad77
Range Proof
672 bytes (Bulletproof)
Memo
ce844048a59f58ff5588e356ce79c3ba51a9f06178c838628293a5705050e3ca07118d64310d061ba00f6c1728b766c34c352cb1a9353bdc403359c9b07b54b51585bf8c8c4090f96beabc67be2046ab35c878f70a437844b789df424c679475648db2325de06d0d5847b0d63648da462846898838be80bd20fe172e6150d249 (encrypted)
Stealth Address
54efd06c5b0bd0ee7056ef5872f8bdac592082eaadd66056611d7aed8b6b2438
Commitment
debec2539b9f3aa5d1375bdceb4877fcfbf6af5be431d622fe9e255605982855
Range Proof
672 bytes (Bulletproof)
Memo
62d584b632901aeb0fa5c2d59556d7c3a32a4253fda277e9f1f73143edec323f4d57aedcf434ed9043169522e0fea8e19531982ac03e6b247611fb93e6c43d394d998b9a0d48ca4b0e5d86989753a94adf6453f399579a2284490ce4c6bd27834b78e909f9949abff16e6200081de7ae9ec7bf5aee11f01696f96f6029b06d5d (encrypted)
Stealth Address
944d9310cb9bd8be81345caf65de3b890b245b5f4e155b391de115493600db79
Commitment
c2c8605ca459149c99c379160961c0a487c44d85612bca7fe54ab6220c23da58
Range Proof
672 bytes (Bulletproof)
Memo
92b8efb4803ee4de3e346469f9bf3854238a063f84e9a0734bd16a1b96ab3bedd45242824f48049642fa00b577d2760c7fa2e86f6c51060209ddeb3a1d00c651f98c3d53e398595835b02cd68c79b836e55c5c59769ffb286e3b52b7ae5426e57e0454f554b6658b5d20043158b780073dee6b73022c1c6e4bc3c94ccb4284a7 (encrypted)