# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be3b27d16d452aa3f8207405e2ac1910bf94cf5d5b179dadf9f6a30484512b3b
Pseudo Output
84ffbc3507e0e609439c186b6af92a6830f5becc6c70d19e82ba4acf284adf22
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c865aafd4e914b6270a95a4de0cd1f7595994ad5d2176dd703159707b5168d1e
Commitment
6cf5269452993dcd62e38a76078a2c01a3f7bbc9c5d58af5684c0f669cbc6543
Range Proof
672 bytes (Bulletproof)
Memo
6f624c9788d65e45a0c994b4fe464a1b46e25e15d97f2ba8aa7092c9784f4217464ec9327340d9cd1b470779d7c24aa37bcbe05a71dd2c5f6702c1784159d003f6f11fa3f8f6e5eabd8a4ef5d112454e918b27f9babe804ec3ace8b8e01417e6581769e37332263211329ea3cd9ecfa7a7f3d3bbcba787e3013b84e9abd8a9e8 (encrypted)
Stealth Address
da991ac639e5d65f34cd0f0932b5442ea8c946e97b452ad4c7243adc7478363a
Commitment
1aad490583778ec91aaec589ff35c3c6bb039129d7db605fa5c37192150b5367
Range Proof
672 bytes (Bulletproof)
Memo
08e918fe882ae40ea6cfec48d76d32a1d2ee1d258897905e9d57afb635364a6542f4c5bd5309be935e7c58f22ebe2aca82cd57996e252ded0f8dc279a87c9ad2d71d9abc8ed6382160d6e4c54aa3317b4c6bcb8e8f9fbff71eb24eeced2cf504124c81ba6a2c91e8b7f73ff38cd8675429170307108ce82192994db4376a3feb (encrypted)
Stealth Address
40a3e9296b430a07791d3525b42ce3ebd95059fabb4eae185ce8b0cd3321841d
Commitment
c8d7c8c1a24ca93b8051e1169e22fdf34104d65d83f715b211acbe4eec80c319
Range Proof
672 bytes (Bulletproof)
Memo
87a3adef299b0c144e2250cd05ae41755701c178d26c4695dfd12caa1d5023047ec276fc2765a62eb7a978c1787888823a0d6ea6758e7429a052f929e4cef87b9999325dea8656e8d41b7545f83dec51016c1e4a229d2dcbdf16b004d7be7dd2daa567b734e48d47d1056443df8d4f135b6742e90adf81f806833911f2bfcf1c (encrypted)