# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
929481325bc05a729348cd30cbfec7cc36b9fe46a44875c56ac002a07c7fd860
Pseudo Output
aabeeac87358eaad09f49fa32b5094a9a6fa3646f6358d8a3d132ba93dd3a556
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cab711f69c5d9ad5c6ac3a85b3ef9b14a1463c506635a3e56bbd0f048831424c
Commitment
22cb70396ddb6cb5821bf77bbaa6d8555c9d3acf02f329e72983f205e0097c74
Range Proof
672 bytes (Bulletproof)
Memo
426a9dac074cad4b24a8d7434d7d57637400791cb3484a2107cb57214756ddf6e9432e8ac202e9cb313be1b738225d9b1fe3458aea465c765bffc85824ec89b72bcec7863c95d50e55a631f02e99e9f34e36b7aac430329d1aa9d50cf77350a0302787ba444a5411615930b2c3147022d5d6fa9384601d5556fdae3646ba43d1 (encrypted)
Stealth Address
4ecbb991aa6cc9d3369fede1b1e48864bc5392b82e157b2e597af5ef4b44687a
Commitment
30f645c3893825a0702ff30473367331d351505f9f90a9f147dfb5daf995a812
Range Proof
672 bytes (Bulletproof)
Memo
e13e77dac62d0f9051118a71f2720051a15b7d8e43f66c7b2f0d7da7c2ab106314fb3297ee927584bec786b29180030aa0b892c5bcfb5b603a186eda74bb9f789d2a9daf0f7c92019cd86030a3b781eca77f07c2c15a9d13277561e63fecbb2f09216416b24c39be364ef03fc67aee62b596c354df9f804d9ec552b6117d2cd7 (encrypted)
Stealth Address
a0610234a95971111ba9088a43460ca28965f0a2b4c61083dfa0fa95bf194211
Commitment
fc23b349c2de56b4d1dd00b8129599589948d5bbf104c02276dc6b8abf2e7050
Range Proof
672 bytes (Bulletproof)
Memo
470c0f4a5c155545e9132bcd19a5d9a91f02cf73edacc2fb3f63c2805ee80ca06ec0964b62ade043c657fd74970cb2f31bd376ef31ddbdea03d0baadb3a0dc3443f5b122390584406b71e2de93cad6fda569a8e3ae26e82fe25de94a605b59a3c304de13b67fcba1d5b89e49b2fe974c8238d84f35d5a80de536f3ca0171b176 (encrypted)