# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
06ccaef341bf7fa99649f571005b60cb52dfcd48ebfba18125733e9a93115e40
Pseudo Output
44c65ab91b7c6fc5ec1858afa4dbf622dc9f039237a1a0d6152d40514aef9c2b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
568337e02763b21bb521c851fb3db6d18a05d1f96c7b2147c42553173472884c
Commitment
1caa39f5b74b8737b977d9783c5b8a91eca6d596601af99ddcfa9a1b6507cc7a
Range Proof
672 bytes (Bulletproof)
Memo
741d47ec831ebbd318a60d45fc2bdb3dc298de5a97c85096034a71afc7e5626328a3ea1062596be3799e987955144d7adb09e6d3144a882fc05e7fd935c9a7db824158097363d49b50dc8729b4aa76898b68d9dd0286301436901a7683870c2813e57f7a91192aa14c109896f13277e638b39156da77b267e96ed76904f7d35f (encrypted)
Stealth Address
e4a624e52a85999199328ea5b4e37baa0fa9c7f8bd0e3e5c8d34b86696644a7b
Commitment
b2e2a4fd613ae8db2ae3d36203e3b98ad141480b63667649f442ae3756b8ec1f
Range Proof
672 bytes (Bulletproof)
Memo
1173608e3a354e847ac510077d3b1641c4cf1f67372a130bf9d4c1c842c322c852435b936cc963f458253ec06ad932e76b17fab7a08570ab1e601e7af0aae2544776e58a18130c684982d4e304b18b2a8ab3da5c832a49ee925fee12fcc5eeb5819dc2a60b6723b49863f727f5336326599c336206f754491e6e98f342df9cf4 (encrypted)
Stealth Address
ae4d713758ded233fa9cd73cb50546a36eebdb3133df0fb214f4bc565cec214e
Commitment
ace65a402028c1475ae15b071cc6d47618da2d0b3acc8d7ad0850a459c929d60
Range Proof
672 bytes (Bulletproof)
Memo
ea5ec1a13006cc7416c31cb5b2c1dac2345e77083a68e4bf7bca568b5425e7d3827d745c6d9cb1d08a08f4ed07f7db46b4d446d9fc0cc3799dfb1ac6b597000b91302e9c7e64bedce46262aae78c80d7cbcf9fa6f6cb0b4be2fe6feeef2bb5c23f087787e83b9aabae48a00bb17dea5dcfd378a7a8b072b7b2dddb294bcfaa9f (encrypted)