# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
28c4d10c2896f850a3068740ab556a1470ce4bf64d5d2a60da845079ce48404b
Pseudo Output
8e73e19621a9d549f2a242f365857e59c6cb77ed87ac2552eba8f73e2054a010
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c3ac1f475be226e9ed1131744c3b8e4bcec9792405c7c1d780b151eb628ac4c
Commitment
d42afd2ef7ed4a6bfbe92fe2cde1b04e4f20004296897e65b1a568c28b9cea5b
Range Proof
672 bytes (Bulletproof)
Memo
68e956ba53350639fb799dbfcf97b56be4fc1ac5680c7232e79b07686dcdb9323685e295d21ea32c2de7a47f70a5bb66c70a1cc5302308cc848d7a0369c3941ea7e099951a02ea14e5f0e64bad096bf4097bd77bbe746625d67f69ea81185c2a74145b16db8729975cc3dccfbe48848b3898ba8704ffd91a0aae9fceb01b6753 (encrypted)
Stealth Address
621b668d0e2e97e5b93c06c38367d376270368d5afe75a1814c0f2ca3cd0a96e
Commitment
90d4fd1e949ca35e6daee3e8ed3fae39f35ad6f50fcc11c9ebc19641a194d12a
Range Proof
672 bytes (Bulletproof)
Memo
2f70d88ea44594b1fc67e85b2b5354b8b342211c1ec2248a1556343ec63f6b2e3d5e09eaea8701b28e7d869d6effa2ed383982b9d1cdc46aa624f89ffc571d34e033038ad997bb18d4dffcbdc5964a894e523792ee2c6881b51f2279de269e1957cb3612911466688aae601741196b9cb3b3199a71e73e7756c8ad75cd8bdc30 (encrypted)
Stealth Address
56c6bde1a91a347a2d8ae9567596dd8e302b715c02669dab8b79a001c92fbe1e
Commitment
6a8f90b12200315706175ef3c9a252273c5fb5e4b6a7712cad2d30188fd8b712
Range Proof
672 bytes (Bulletproof)
Memo
78802731bd8d8b67a02073c3e25dfdeefe71aa8d6c430e53260e1072982f3c81545157841c2e1ad84ca88c68d8692699dc608ee20d306435171b514fc63f79c53e3f1084a52e0d071faee595f652213411c0e79f1df05aebd21d84d553aa16740fc8a9eafb611e3ed3ddd77979898afe99307deb9a98eb70681a328fdeaeaab0 (encrypted)