# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6271a3d58af513dc107f75aa8d46c688cfff710ba32533e2db31b85f35ff7c04
Pseudo Output
a2f054dbb24840da20bdd39de4b019535c004bcd7bfb1bf55f8b49ae7e22f564
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eca608c3b3d2ea91e00ab4f85477e4ddc13838c6dd22e97a8c8d1ca00f1f7b78
Commitment
2843b90e098c6bbf5dfd6a290e4177825b2bc26853213149af3b1c84ab0aa616
Range Proof
672 bytes (Bulletproof)
Memo
6d684be16519f3c6962c76768b6c7c710976db7f2c8db99dd204e7487e7d4b6a52e1b81965b9b7316a36f00e8154d54b8654febc9176a637bff9c9fbe9af794b956f271a81b15315aa05bc31dde3cab5d119b2d193d46003170ea82da4d71e93415f24f78e2b1764f41228c066059f1983540c7979ce7623da002505d2458c54 (encrypted)
Stealth Address
e617f17f3179059555fc6179ec545d9bda29a63d61e5d312e692170e75e89527
Commitment
6449f0153afaee2c0be0cb7175b7650ad09e496166c543fade0c0ce4d169754f
Range Proof
672 bytes (Bulletproof)
Memo
1be7df9cddf2240077caf210c672f77f8bde2ded5c20aafee6dae376144618515fc89028b3ff52510b53df743c7b365dafa2b1ebd5aaf19523bef36f57a9efe15516399da07b234c4faa4fb7a778c9f4058123e2014e79a6e988a4a07d4fcf014a4bff2cac5619adef8be42cf5ac8c0e4986f742502a37aa1b24279534a7d242 (encrypted)
Stealth Address
7c0a8b24d7f464eeb08f6a5a6b21b69681788bdbf8caba622ea1cd9dc641987d
Commitment
c8916114973b46934ccc42dc4b00213cdd0f2695037be27bfd95eb8eee398a7e
Range Proof
672 bytes (Bulletproof)
Memo
6cc481be31e8adb751a2b4941c663e9978adefae1b7aa2fa797e0c9569854ff5cd198c676867cb2b8bc6794e9dbec74255af4fa1a4e167515f4e34edc10df7905ec46d296890767f353ca14a3ae058b6d3eaa794635ef8f9f34b1a070ca45b0d150610aa7116b5005dda0390cb96ea9f95e4cb92e23351fd2cb72d70211f94c2 (encrypted)