# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec3a12ea296ddf94d434a5d45e7a2f336e0d21681ce000491f6cdd6a09b87e20
Pseudo Output
6a75d9214ca55081ffdc60b532336d080b6b1b1972d59d63f87e36c366888a2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a649a050189b4a0daf722a7f01e97ac32649c5ed430cae89daa082bc97e2e24
Commitment
62359dc194e2cdb68bd3f55894e12bd45d34515c1baed1b519dd7c9029fc425e
Range Proof
672 bytes (Bulletproof)
Memo
5f274a3e94ea5fb88f6be3ac0b83e0a2cbf3c96ffd679002132cbf96c4fbf4093a87e96221c7f34cfbcc28bc1988abced5d52c4cee54cd2d1cdf8e6b84201994ae005290d9f267d767d7a77d7d0be5ebec95e871ea1089f52a56ce4c74ff455d1dd9011428bffc716114887b801208e79073c8513745b0ed7336b5a44f71069a (encrypted)
Stealth Address
d82de7cdb3997251af328b953f1b836e1fc9a89c3e4fbff3298d80dcdb46432a
Commitment
3e55b8fbc48e52a29a15d8fd426a680afdb3339587fd03e156202be6c8da0d2a
Range Proof
672 bytes (Bulletproof)
Memo
6e0786ea1c7d8187db0cf145c63a5bf06b5f6bdd54a868ee3208ff07fc1e64a125a7860328f1b68c6e969c0496c322b9cfb2507ffa08fba08dd8981cb3e1378380718c5e139d966e275f2cf2d4e046d144a564e97948cca4219689c331f80fbece1dd98c24afa5c4975d6e9e1775df7f31b853d2e07cd12c33bfa58b70139782 (encrypted)
Stealth Address
881b3e855b674e663d8ed4b09885c7fd2eed0c8d22683f9a1bbcf7b7c3412d54
Commitment
e8e109c74771a9e584e02ce0554d1de677f6cd1e8bce7928e7bd474d3767d921
Range Proof
672 bytes (Bulletproof)
Memo
135a44fdfce72e85c099ac299f266e11c0b8fd4713d217fc1397bdc357cebd5e15d85c124d655e89d1ccb9fb52501e00aeffbe52e4eadb5baa7d8aad929b594a537b39ede724c759a7cd2442bc5d26382ea022ce004ce8346ae19735d6ce648ab401ec024e98323b5908ec0ee2fe6e003f13e1198ebb5a18626ba3ce285a7164 (encrypted)