# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2969514f21b65e2d1584cb79426f1bd44eb07a7ad7e5bb1732ac59e90cb0c39
Pseudo Output
10e38648bf3b78fc8bff79cd316db3d4ce2259a291c6b695b77842a6febaa164
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dcd108e6304082003a5559215ff6146480476cdee0fb5bca5e4dd98f79834430
Commitment
ba99a957726f25a9a43ad49f400ef47fd5048d961ca851f0de2a519129bd1578
Range Proof
672 bytes (Bulletproof)
Memo
1f51cff0bdfe21e28acf971856f4664f916e5fb3600704be56065a52b609eae1d07d911e30de332c8fc0fae0115854cb23c3687ce1411c47f2937ee4f0330352597016c04f2c31ed74e767597e2294f9ae314b0858466d95fd3cba215b186ffdcd855605b6f3bce21048e456b9a55b0891252ac2f8476e0ec347402c87e3ad8b (encrypted)
Stealth Address
9069f6d7fa2c20e9b1b5c6d6a55e76eec40bbb13e89930da4a6e5a4d71107002
Commitment
70201537c0a87f97e4a2ffd38d9a21e6541bff9f8279dca09ed46ec0923bab75
Range Proof
672 bytes (Bulletproof)
Memo
ceff311454fb4a2f1fbf6243551204aaf2c45e74f92c640e8471a88f0146526fda67cca9136a9e5ab327fa663a25795897cf948cf9d02585f5396fe81df6d90dc527b8b7fa876d91e74331c4238b4369a72a41fe213d64ef0829e9ad2889e2511156638bb015ed3ec375f77c15c5b1a07011493e99159b156dffd473bf8cac12 (encrypted)
Stealth Address
eaa0ace1ec1ad11ae9f6f0fbe61e1a4a1ab7c2fbebf04c504055688de6a1e56b
Commitment
162378d68005a75740b5887ae8fda8ffa8ebc4964f099b68e78e7aa69acf057a
Range Proof
672 bytes (Bulletproof)
Memo
895546b2d4948de6cf0a2487425e529d2acbf31f623ea8c94b87ae3e96d6db20d0a69d5a3b2ff7e4321cf78a7235ffa6a901d72cf2c1b14f324ed098100de4e238ca4bdd8afeebc3237bdc8693b62795ea4a194c7e7897017d305057e3c2ef97cfdc5df07f2c8ed587efe16fad25db4b99c6a997295513e1975019e0a7212dde (encrypted)