# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20add8f617564f4a45ea298cdf1ab311cbd3c638e4a7ca66018c1f654138d428
Pseudo Output
cc2761483fe93746eeb7c33c2fc4dd0c4a82662d5baa03ba8f8c5bda107c7270
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
867d6debedb25afbada8b2b77ce81290ba81b159bb8212ece7cafb82956e8c4f
Commitment
ce79cdc4fb284855faf24533bdc6955cc1fa0f9beef1447366401b6b50fc677c
Range Proof
672 bytes (Bulletproof)
Memo
dfddc5ff2bbf488777ff25eaacfdd0192d566ec3a8fee5b8bb2a423cd71393f34410c4e344d85070d5a018866949dc70521d081e0f04410f654de72008dc907ece8f2a0d44a7b00a67e2335345d4f2ba59cd2cb65952bad398f25df40b5618a0aaea2dca37bccc874079ddec5ec7bbd8f958004c75651355813e126604640d81 (encrypted)
Stealth Address
ee0728cc36a4d570a1939aa88f91a66f18e558eb962d32176c4c8d3d8d29085d
Commitment
402a85d8d601cba0ed0c883d24db6fb804d95bf50299c134dd7aab03ebf5b27c
Range Proof
672 bytes (Bulletproof)
Memo
60c8a783b511bc144b032dd4b5dd20d680b5b9d25ffe42a0d76a5492bec081a34f5cbe5e389cf75d87a3377a38ac8a29321a1668963f6231626a710091ceda782b5d74565c2838310c2e546b49644cfffd9139aae37650d432d759a87cf4516a6248f11866f2d6e8e6a696f61308d97269f5061bdf2397a5ae700a7508f5edae (encrypted)
Stealth Address
6c5736048ce633468cf1e1e49e310cfbef1ebcd1c47ff0a69aaa284642a8d320
Commitment
500d9f9e18a48e31c10e99b58374f61aaaaee176e87529c899af0fc7a9ba342d
Range Proof
672 bytes (Bulletproof)
Memo
34aad761193ff1f279663c8a1876f8498648ad192b5baf59a3c13d357ae34db25a084acf05ad4f810a6af1f5068d1adf2fdaa58cf38367b329e52e1201f06435e8116717fb0361cfd9f45873cf69cb51b683168346436a1b12736b2a1bf10c9a75b1ac2c9f04cdb4823f2f8e759ff3e68d18ce7f8358e69231242c4b0dcc1bf9 (encrypted)