# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6cc948a1d4717ff3c28243383c41d845116e355e26710d808365b0d4575a4826
Pseudo Output
a8ed4ba5390dc2962a783f336901ef0e084c9b87a3fee10b2d062e5acfaa8d70
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fe4544a14dc47897f7a648223e6f9ecb326df5c281469d133f663567089a052a
Commitment
1e9c457b1c3c942b36be4b6c3f5b8b51735852e73e0fd7c3c6b95cf20c29681f
Range Proof
672 bytes (Bulletproof)
Memo
ebe782b7028638634b9cd7004b94d6fda645a6998e0f123916d142b13cbbc8ba6414518c5ec9f90fb4356f80d62fff1a9ca5cad0db6517b06e4ed7044d134a389d32a3e0a85cc6fc304e18262ab88414dc5a98e4cb6f6823ab6ba84456ea7bf323cbcfaaf5039763d673b88f5328d03743e6be36a16501373479f29913886f24 (encrypted)
Stealth Address
cc945b73697baff4f0a653fc5e2a7e073c3d45ffe505e496fa53c2afb5a77f28
Commitment
f8f881f5f3868b4005368ba8730165a674762a62153799fb16b1c8a2c8337975
Range Proof
672 bytes (Bulletproof)
Memo
c3bb9817b1255bd05e4b80265b3d4dfb324b49ea8bdfbb2f6fb52048f43724ec7d817a3b6cecc1e478abf162a1cca98ec9ccea029133af520dba0a733dc18a361a3ab8378e0ea5ad127977ea3c26cfa15a830b23f846f6352b4de5e0182a01673a64f104c083670ac3d469feaf5b2ce9b4afc89af01177b905502c68d6401e67 (encrypted)
Stealth Address
fa7efe176348dbdd73976997c9e5c371adff14fdf31f4b6b94698b254c4e6c1a
Commitment
4c250d6ac3c96b0de163594da8116e20838408b96b4106f0d8b0744238fb0218
Range Proof
672 bytes (Bulletproof)
Memo
6c18b3470046c1893ad6c317c04fa0db8ca1026fd3cd67b120be1dc3deab48f7354526237e0b0660bef45b93ef10aad09a2cff719e130783b5b68152e5d696ff8888d3cbfb6274fc2e3f5b890631c33d07d079cde449ca79557104059167b413345233e6d4fcd73e6b7726bacc84599beb808a52ab36c6a39c9ca31aa4ab3b7e (encrypted)