# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
98d4814be068e84bc69d540cebbe113a2f1f9dfa1cc73f1f69cd50194bec486f
Pseudo Output
26c21b0180b1d99a6e6bf7af07acb0a5cab28ef997261eb2b7c26db1e9bd8169
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6ca3689a5b0225b7eecb371d10a68da88ba54e94368a15a193304a9a54c68521
Commitment
ee4e7828bf40cd198eb8ccc6862b275bd998234269607e402d8581e63132a016
Range Proof
672 bytes (Bulletproof)
Memo
fffa935e28f4f81b15ee01d1f752b0859799c6fa702a71021ef23d144f02af17b9adcf4f047f9d1711565d7777943b431907e81838211eb33e6b8ab959c248f6f593cd41cede37986813c7e0b0031959e7d4ad2ba0b3538e249e580058a03b965f6fc7c480bc38f1f474a50535b663e26499c4808d26e1bab1f9185eacaa3acb (encrypted)
Stealth Address
fcbb373189b9f8e41cb162222129a4de4a7dfb14d0ed918443d241bdd44acf1a
Commitment
1a8cbfe83a86bd95b706743401695b501c9ecfedd9ec33815b13c96075f4957f
Range Proof
672 bytes (Bulletproof)
Memo
221b9d9465704fffea5ed92d717a7254b4f6cafb0da8d0699d0b6398d9ce9f0b9159f0cfdbce0955ed52a39f94d22093df515ab831a4f72b5800d2474204d3cd130fc832c967ad77f159aeb6bbe8f437e4ad59f54468431f012c25f33762bcb027ecfdc888229794cbf060a7c3442bfe8faa0b02f15797de18b28a1f25beb7a2 (encrypted)