# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c0e747010fa795dcda31dd8599ddd27e3df8da2c5f096de81c1d56389389974
Pseudo Output
aa508cd85a175b10d072181951ae501b790b78e2cfee500afc1e279148c87340
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6e2e61e178ef630fb6dba0bdb233905ad5aa6b4e80deb7df6ab2086f2c5ca06e
Commitment
fcd9d87ceb37111251f890c4929d58eb0299df927172be038f05999d74764d55
Range Proof
672 bytes (Bulletproof)
Memo
61f0736e80dbd0d97e3323f980c5f1929a64cf7909546a5af98f4e93e48bd7b93596fabbedafe63aa7925a3f9ac56ebf698e1c3d7dec32d0e049e116f42a23648afa8f92df63caeef2d465030ba1eeff905839132b8b20b061e31e7f3d334476fceeacfaf810bb8da6d697677ed124f50f3e2ce6d51ab2175ef9b746571ca92e (encrypted)
Stealth Address
ea2d55b7aab351e41af79bd1f4695bf85024a8b4cfb7eb8fa812dd32207d7272
Commitment
24a5a9dc4dd973119c29e8fb1d970b6d6ee89e753c689466fabf5dcf8336842e
Range Proof
672 bytes (Bulletproof)
Memo
dcec0311e0c273ffd98674d407846b721a9726aefdf4b300142c137ce0b3a72d4efca81449d79d672cbba41555117921e499300ef246f49c0dc65fcdddf04e1ddf40e640635488ac07cf0cb605b422fa207a65e316dcf1c26b79d980b47262369d1bfa20359ae8ae5ddb6f27b2e69b0ade5a47f9bae16621faddc144a2ca1884 (encrypted)
Stealth Address
a06d80bfdf241a778f62803aad6f87601c6a8e9d588cea3350068ff3732b8252
Commitment
068c211b46df532a1acf20e6d14c1be345faca37a167a9825a835ce1ea238566
Range Proof
672 bytes (Bulletproof)
Memo
71d014f0487fe8b72abe958b25099dd3fe55da6547e2379f6ab8f39386f6a3502c89cb7cb9e3ac3c2151239e21c6f3e58d57e61add23d1f62ea876719bd1341e8602e2e61a3e477e17367274cea24dc970a7e32dd85e75887bb247995a3aad395f0189d5d7a034ebffa3bf4e38f5fb0a92ecbd1e7ac756e8efe6e86b6a93dd49 (encrypted)