# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e88cde71bc63809b44bc05da6ff2b38ca52acd44cf91858b093a4cecf95ac002
Pseudo Output
dee67435b905ec97b045c9b9f28e8923a43e516b15913b1c3b7cab0353fcac61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6abccb7fc8c672bfb21422c7c92abfe32a9d41d8ace8ed056725b9bd63e6d11c
Commitment
f0a55f3f94d21bb2d6fa34335d745b49d1d87b9b8662b26b4eb177763dd82f27
Range Proof
672 bytes (Bulletproof)
Memo
6dcaadee46dae948b0fe63cf2698a930d157dd4db652fe595df5684a91e1e6c2523744eb76fe291f5065bce2b29926b2cc427f44c50c2dfc9e0536e66aef06930401c7d5c86b588fe94aef38ce00c27a79dc36ab30747183ad03a89f02f75f14a3483b07f6355affd8a96fe26e2b7b3109215dd15fac235ac053cadc6264539f (encrypted)
Stealth Address
8c5098407423b83a745cff0dd933c7be18c2d13400cb073d300a2e304c53791f
Commitment
c87a2ab4e67227c898cc92422a0dbbc28283353cd837a492b25c3c47835fbb77
Range Proof
672 bytes (Bulletproof)
Memo
ebaa5e60029f23b4abf4d95e36b14fd36f7b41d5f05fd1e20b3b9c1d6fca1d18df25dbc8ca1ef472341a09c87397d773e4a3718197a4ccdd4317c84a92f3f7c05ab39cecc6e8d7b42e74abf9cd2a29557acdb0c1d060eb4fd56b350bc8f2aebc0c632efc5635a77c3b3bf89385aa127d1ee7c868f38ee88354782d57f0a2d79a (encrypted)
Stealth Address
861235664a23b80c8ca200b03f0d08cb63a0425b6c34485370c25cabbd14716b
Commitment
90dab1001d14d495db75c4f2a3dbd3a875ed55af4e063c57d213a290ccea6112
Range Proof
672 bytes (Bulletproof)
Memo
c8c1a38cdbbb058464fc44f18bf4a1d2218a89624c4db774d23da2ea50b128a4a58c08077e2a1180312fd7bf7f3b363400616e8d7669f42b67407f075c26e77b588698a2d6cceef3c9f36baed25a89b24bf4bc82ae41b3c3eb5f314280eda076b6bb3bdac098982277a45739cd0f71c6f598c8647c986445d6d57b7d8bd8466a (encrypted)