# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c815bf4c3fc5e3be205301566dddd05e5176808804c6a8cd8b279ca9bc550826
Pseudo Output
847a32fb76c7d0e42313c0ce7a4d84907ecd42f6365bae12c0677a24f7e9265f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cebc528bf9379b532744ca23c58ed055d24b4955477827d87849f54f4b9c2100
Commitment
709c1ad8c0bb96ee429a147fec7063754d916e4de7948fb7f6a6db7383ea2a79
Range Proof
672 bytes (Bulletproof)
Memo
9f2575dc0b5f9a610b668d909bf013718786b91bf09a42918861f45022cba4cf73e6462fa6bec43549393ed5cd5d7626f693fe6c1fde68085aee3f3b4a4d29d7a058baec71169238755b36bfc098fc02efd86f1ee2b91ab34af31544d7c7db411255e04b43787cfd384ed7b9aa11ab59b17658a72881985dcef892640fe82e46 (encrypted)
Stealth Address
1465231eb774e3e50449465867fe7f9fe7c988185f3eedebd35c952075ff0a1c
Commitment
3c4e039281d99659262c3a6d4de8dfc77e9608de0457b2cf52b477df0825650d
Range Proof
672 bytes (Bulletproof)
Memo
7e7acbd7550f13451d41e98b0b9226d599bb64eb77465478d742e3720f4a2e09e924f61a4b653803faac523dca67e181aea478b65006d6d08a39c522331e8f8aef2395807ac3c1a8e3bb665ea4d5ec5bbf7aae9f1a82575878d2f39ff5cce7d2e540b8a29cbe703af52f4b38cf1b59942a58195d6f15e77b959c71694214277e (encrypted)
Stealth Address
a8342c17d78e8807edce681125c630b1d4455f755cffcf3aaeadda6a2bcbac31
Commitment
e8954aec98d443afe1699de67ebad3a82789265a38f4eb02f1b00107058c4751
Range Proof
672 bytes (Bulletproof)
Memo
8016c201c155c7a29a8167dd1a03d7f0a39955527709306d60980c8a2d15e17cd2c2ab18a78f24fffb93ebe8e915cb5c1b7d9b0312bb7f506c6c13fcabaf6d3e368bcad9504f294cc8d2ebeb5983a74a34694ac5d5a19571d7a0537a95c5c8e2054092c24d77c1f2386d5666fa957416c3cdfb654b2f6ceb5c292bcc802fd7a5 (encrypted)