# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
34bbe202e790195635ff6974eb6b0933dd9b2f14ac76e7c11fc1f6f120529648
Pseudo Output
0a7cede86e3ff0d9f3b7458a24a0f1df7e27833b303e8fa72363cacf76d5101d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
023c2bde08b62b7b12307ef9b5bfdd12dd34cfcc06b559a8cb2880a5aee4ae2c
Commitment
26ca6911b573b4ba971850a988722af4bb9afbe7f432b52eca98174305d9dc04
Range Proof
672 bytes (Bulletproof)
Memo
7ce7329cbf74fb5e3f55479a8068c44e6f82e92eaba8b3d011f99a5cb6d3ef34e55dc2537294c4f08d95db8e08ab6353f9302ed6121839119e2a373f4313a2b047b470c39f36435da1f761b1fd7931d023ab3e73509ed65965d41b0be4436f49575a6aae6defb72897c634f6f445e85043ae7f6538f253cab2884bbb28992917 (encrypted)
Stealth Address
60b0b88db26a7f644138d99ce7d946df018b114968c342bc19b5094de8487f78
Commitment
22ddbbd8d662271c79d2ac98b173ce3de727d3f02e64390c0b0b384dd3fc8c2f
Range Proof
672 bytes (Bulletproof)
Memo
ab325179ca5d427dc6a05dbbce88c45d34882639ed640b871aa2ceb610d25cbee6fb35a2367be43aa0c54dc85cfe06ea8b35472649501a3a8bef45419550ca28c184e81878e1213fa6b5c59483a54d643a274c823429886e0718d114a9becc6e938b93921c2560b753b673bb4086f6cba22e0f7374d4d65a1484e8c77b5e4f8b (encrypted)
Stealth Address
74d90c4d8f0c24a18244d0eee72d8bae3f38c8f7efa6f3e84554204cb995123f
Commitment
1c8e821e8a271b0a968798651c621bcd357874f44bb28cd33ad99f60a2b7fa10
Range Proof
672 bytes (Bulletproof)
Memo
92b72599e66e5edb76e1a9cf1d8083eeb70694aa90546d5a18ba20a2febfd26803d954f41c9917e8f14a747feeb62d67a1889dce0ca523f0300020f041216eaa6ffc250f3e86769b9c6fd7edc38abc1333d90c4efa6d19408ab9ebf547093a27bad6cb055b6cc2c2a7a984173201c21e33a9a10e401b68cf7db1299d21494247 (encrypted)