# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0cf61bb1df768cc4c5225c01d7e041caae579ff8bd71a614670aa8b738446437
Pseudo Output
08a2575fb9cfa18c10c67f24c1a7ca325db1e9bc2be0e1b3c5509ebe9f395b33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6c22c71d6958ebf8ba62653c8a64abf1f4dc017d230650cc89e2c97cb91f479
Commitment
d6f1d2533ca6b8a8cd0b2c30fc460f6958b8345f856dcbd5c9463552a0d7b418
Range Proof
672 bytes (Bulletproof)
Memo
b6513fed3dbedc7eac531cc90c9bccdd2c214b5515fbf5562d78dec59cd00efa815cf33433da4880715e12396370b27b0893d3f1c6a4804ffbeb43ca97c5d8f70dae24f144657b157689eb758b8df418a71fda3ff75601f87961d48293ec1f8042993f19cec4e8bbd30cce8fe5434a38624769a8bb4835236209466ef73e1e65 (encrypted)
Stealth Address
665260dbd371b73020af70e5213fcefc8a73d4b69b8292b257163e01b1d35762
Commitment
fce3fcbdff563c0e40eb648307fc758b6bc2bd99b2cf7c85796867d40a30f128
Range Proof
672 bytes (Bulletproof)
Memo
f0d38a58fb65cd0956d5f62de8623754ef751c09ba3b69f2b601b7fcdc55ff736d56380d784f74004859b78deda8b8740b152960c554ec4e72d436f91f831d9906b7fd5886e17c414e16faf65fd4f07f5abbcf06fcdec7813e4ea69891fb772fe10223d8c7f6f2a845609b32c6002a6525d2d988b2dc071581e427f0b12a8652 (encrypted)
Stealth Address
765d4e11087371fc6079e5b0d53bd83ea5eefaa5396bbf91ee5b5bde2904501b
Commitment
ba90ef3e6543bdc1a5a8392953666003232fc7efe2ed77797912841c962a912a
Range Proof
672 bytes (Bulletproof)
Memo
1386325f725e879dd7b02a97c22c7b64d1ab9d99ee04746b60667a9f816d5d9c693ca00d3c1efccc33cba3bdc79dec5ccfb7df9c8c76481e4ad9d15faa5826e863d4f69167f6b9ef9c1f5e3779e90ecd8d89f9fbc5191d14d18abf0d1d9da2b80e2e37d23b360d12e2a9ce92a6a6a005451aeea7571cf5c735d41cb00b7c4aa1 (encrypted)