# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b01c806e9b9e8e8f70980a241e092056a71d0dd503e0cba47a7cdf9fbf9cf374
Pseudo Output
0232561bab27e76ca58fbf3acdf5e85644a16faaa63639535a6ca59dd94a2933
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b6dde0138ef5c4fe8f56b2f50c2b6ddd9a8674b7c336cc6f637eb3063c82cd0a
Commitment
66a597b237cbb548468d9aca6ecb6d121eff701f30489467dd544a60fe378f02
Range Proof
672 bytes (Bulletproof)
Memo
6c531203ee05173caed388e677ac61419b3527b6a8cda62171949ad2b58abd52682e28a341f4b1679b1a2abccd904cfa51a4ec42d7e69d2ce09e54dd93856bb8de9ebbf92b7cb424914ac12a84a7b609442223c5aca8e15f612b6fb6305bb36e28b8fc4d74249888684f01b737f6195e2dbe92afdbd466ff6c9079f639cc94ca (encrypted)
Stealth Address
9ec9ecc193beaa97bbbf9be4d135715b9f5189524181ca27b74f3e46b0d01344
Commitment
a636f0dd37854bf1803b81881f78d177d48375a0ac8232a678615b731ff8aa5b
Range Proof
672 bytes (Bulletproof)
Memo
39cf369fb2b70874295680f491101024c3559fc16227b4fd408f63b5b6e145b70c025fadd725bb9c4e438b850fd149c16b750c1017a27cf9ac8d5d50d583037f57d6edc5026d74fd3183c4a263a349f1538c2155568333f583bd03dde18238de984ed17613d4a2841bcfe5be75a673b40780739ad8308bedeca93714b14e6a9e (encrypted)
Stealth Address
54e3409a63f3c187be56abf28757243f89fc95c0fcf08c0861f9ed33398a5b2e
Commitment
9635df035b436795cf34bb4808ad851426509f40dfcfad3b3d05bf8625365749
Range Proof
672 bytes (Bulletproof)
Memo
da74319f0e6070e1ba5283ddf34a127d5654f08325281576cb19a5a5398d6b6ba07acc42b7621a72379fd380152f2ed69a0d1d5891621bd9241cf294e655ac05f22190d0df2efe0ca9528dd85bc0e55f715863c92ada4d1cfd805890932f4970f23f09e56431858b56eb678acd13d1feb7de1e69f141881e971e8c383be8fe33 (encrypted)