# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
623519ce8f9e617418cfba07c92805c446ef410aca213ed88e2d9f33d676086d
Pseudo Output
bccb13365403cfa4ab07a0342b9eae53694536f19f3cc5d1eb2d14c0c8507e02
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d05a4cad2c8edb868f02c76a6acd96872aade0790e27191acd04c3648ae5215a
Commitment
14807a8a4a7cb808561c3c620d9ea498b3b5be3795cb41cba164ea3e994a056a
Range Proof
672 bytes (Bulletproof)
Memo
1cc687e6eee5dbc88efb0ce52dffa765f83b6385c7155ca14c8ddb44878411ea179fe67aff2102e403bd451142964db7856d712d708e99e75305fbfcb6e849259beb0203736a5fbb08798e529f2b8ee6ca42f81738324acbde8908676d0c3de03b9111bcebf5502c5930c141ba08b9dba15fb6ba06e452040abef1f6e9a7c67f (encrypted)
Stealth Address
ea60c1ac98273dae7e7bd91d8e028fd0304725a334b140525ceb02b6b7b50b7b
Commitment
6646192bb1b89f9383a7ec62e867bdd46f90c4433553624da7c384d9cbd36441
Range Proof
672 bytes (Bulletproof)
Memo
0a226caddec6440f34a2614e70f4577e56e11bab6f3e3e9c2a14d05f4b14e82315e597e7328dca32076bcce024f9535e2b5cb7d524a3247b78f28db6c4835024b420af9605ee981c73ef86ae05a90b5ee2e744ded89573d6749941640e6de7bd6976dacc275a164f16a6f7cd34e9d8db9358f6c6978844e643f7a1e17ab8708b (encrypted)
Stealth Address
bce32cc172546c98a84ac7b8f3f9560eddcc57fdfaa78a6472f5b167086f6771
Commitment
f235aed065841e304c72e41233ea9ea104bee72f2a600536652a22a664f28214
Range Proof
672 bytes (Bulletproof)
Memo
cf27915a07d8468a20f51b37d4d3e42f4853a26cfd0b597701e5728fdb73e7c23d924f12b05f04b56847f453bd0e6a1e3c04d4cd8f20f771f150c22de4e39c03bd91101bde9381cd1d0c458cd5361ffff11454ff3d70b6c8cba8bcc6c3c07abf34c95bf64d886f8e0d95fa711ff0643344202e67f7921a5d354697ec714a3d3c (encrypted)