# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5e8faa5d76e7a2edeacfc4335ea2101143d4d4d8077a81fd270639687f307810
Pseudo Output
c6bee94593261a7f622ebe347484223c35ff536efc5973ab9c2e90621399d52e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b6a24014745daa00e5ab9a3e816e581a84bac6aff364e373721dac3729cd7e5e
Commitment
e66ac5fcb08e4417b9d0d6110c7ed229103ecb0973b1aca19597b0d5dcd8b30f
Range Proof
672 bytes (Bulletproof)
Memo
7652420bd19c84573412cf32a860f8b4b8ca4258d22159c9a9d1343bb5e16e369f6e4c49efcc03e15c71b372166ec2eb46b66d3a8b31b59f1b7cf16c21fa4ba4997147434108efe6b6d24daa3cad4af26ab794d499a4ab840a3ed3bddefe7699ebdc7299c91d56971d0730d26c963ebe8e9e6ecd4ab3a3019700ad85b96d1a1c (encrypted)
Stealth Address
82f35c8835f81e2b3a001071f1a0876dc256710f328a274fd8b45eea86b1f505
Commitment
347883a8350a4938455a21b6ab4b608e74529f1266fc48a1cc19364126fc2339
Range Proof
672 bytes (Bulletproof)
Memo
e826c86a752d0712d9a837402c7a70ffef545e42dac01aba86ad12ff78d88b3b7675482114f7a8971f1e8b8e80cc1ed31a8b4b332dc3305d51496891964af92a1ff3879c2e7d9825694a9c9c0ba6e48e497c7069c52adc96c8b59a420ec18e9df128d23d2b8fe8c4b460a115f9542319c29ab032ba6e417e97a9979bbac8789d (encrypted)
Stealth Address
2a79ceab9226174ff4cb74a903c1a529fba0d33caec6292f388216c2ed4aeb26
Commitment
a0738d1aae67c7497872f1ca78819705ff228b0a219596a610bfd199411bcb3e
Range Proof
672 bytes (Bulletproof)
Memo
2b3e5e204b264e8cd9911e2465380da04d5950eeffcdbd18bfecf7a1abfe654c98831473248a67ec944efc9e89307c7007f062ec34aef26306fa4d42af1711d8c337bbfde4935d3e529bbaa6f87425d2659c1dafd8dede36a85d7a5f659ce3ea5958f4c8d57a0a049942192fc15bfc0bcd18d1f48d31919960b26eb842065ab1 (encrypted)