# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8e9f34156a3c602fe1a81b8b05667a54a36d7d1644a8de2c6bf724b9520efb7b
Pseudo Output
c0da994ffe7f675d0681ac4daa80fac1f4e33ec6fe16761353873da19c180d54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6a1c6899e3e9fe3d75ae70badbce70590af2bf5e9626679387a25aec56679a7c
Commitment
72ec8a220155e1c2f98ad845e9848ce14b20823d63edfe63daea237d9077b216
Range Proof
672 bytes (Bulletproof)
Memo
d226e6758b6cef3e1fb56af2593c06a0bddae8f4d5221d8997ea4ff39b109ecafb795c6144b24212d1b36c3373c1d5ebd29195682e3d4a42ddb4a5c88137d5ee2d33eb7524631f1fb3f779e1ff852a8e280be6ee1d21fc3fadaa536ccb4225de1b6bb126df55091d727df81a909b1e456bc83b4889c765c84af571f5544a511a (encrypted)
Stealth Address
c8eafd45aee4a1c98b60bb96fd508a07dd4686d6c34da0d248e1668b5381874a
Commitment
1ac615c60b24806e62798d75075b88d97d5b7d5e75a26a9ba75efa9bf2e79101
Range Proof
672 bytes (Bulletproof)
Memo
68e9ff2e514ca5510511a4a69c9b42e76f967413971c57741b989db6b59894430d714dca8ab6003e18b0d9c87e47bc99b61256147fe307e88dde69129ae827d3291c0e5fc90f06eec961ede88892ed1e1c0346508179978f949256c5922615769e7ed763389b822f13ea58eb34b7a1a026f712d38972aef64516382824e85f2d (encrypted)
Stealth Address
6a5bba2bc8d85771a9bf5f9aa8935604a3869a8b83c737b3791d23321f371f09
Commitment
a276443bdddfdfab5fe9728155cc51e11709d93b3368b79fd3e2d58a3b1ea446
Range Proof
672 bytes (Bulletproof)
Memo
c04568b32e94e7157e3c4a150fd956d4faf263d0944cb7b1125c165e2c4052a90ba738d513314d0924a8198619ab5669d66ee0a5b04889b98d782ac018e5ea7bfc61bb264367d09d5ceddb1c8672ca1e9dc5b2b7f0478d4ec04c17a9a955632ac2832783f2373148c16ca9683b1169eeb134d0835c8e5616e8b69d613559618e (encrypted)