# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ccf5be9d717e1590810a44f09c26d5324a6b1926524332f5129c9f0d6345c35
Pseudo Output
6a6fc112363dfb7b70b357639f07f412fc94c05390948bfa272213bf8419993b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3cf8a6acedee29087807cc0f5617fd6c4635470f61fd154a52e0467436cddb2c
Commitment
4c4731936a3d570e1ef2527fec879bf80ba09b2cb504060aaee84c84cbfd8175
Range Proof
672 bytes (Bulletproof)
Memo
a87c1fe035e1ff99370fd37f579008facc599106bc3d4442cba86c94920e938b384f59bb2a8d100e7000669150e49a6cccf2be197377f11a61fd09d0c041537194f3c977f2558d746cecfa019cd92cc41610efc2756759fc184185547fc64a70e62693b10e4d500be8089eda52f42eda1d52459331a974151e77267bd9a29e12 (encrypted)
Stealth Address
26cc60b0d117d495a3fccc54a1e7591d1b31967a5137bb997f4b22e672d98951
Commitment
889caf4fedacee1dbf2c147e0a125f478955f8d9726480e5fb55d88a2724b945
Range Proof
672 bytes (Bulletproof)
Memo
10aa528d2d736aecf5ccbd79a207548217c6a652cbf264923f07e622c6037c32ba40d1005d5b3814b56d17dd97473c16dc8c52aaa14fd6b5d723d149ab2211f37b00359404bcf0038c7709beccc6a2f7e660c4d7c0404cca2eab8d4c2390156d348bf738b15123bfc7dd286a7599b3bdbee9409b9b92c8928a7b4f777e56e678 (encrypted)
Stealth Address
66b1a8ae834007bff498883661c141c3e4d31767edb3c50cfcc80f578d070447
Commitment
dc131d8a008da7c6633b7435f1cc90a86188f43f3937975f22e58d3d0b69a868
Range Proof
672 bytes (Bulletproof)
Memo
88320d58ba9b463c478fa592dd4694784a01ec36a94b92e1f3d7d8826f8a49d7f5dd75241cc62a8cc37c598dfa75a4be17950a4b327d0676d414b9a9ba00ed16bfccdb37cda7d53a48a5ef3bf4a2cb87b8a11b20539b78d921f8ad5c37806d153cd0a00901674669dd5111d7e8604e1f4610a8a6912d91c62062754994de7a66 (encrypted)