# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc9c79e3505717c731c214537731a3c67a22d7df15d98f3c2f1f99a6213cbc4f
Pseudo Output
4e58fab86ff5c0e1859966db4d49ec12634e90b2d4f4a99ca46d9e11b5e54f0f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6a78f3c4fa7cf4bfb9515d8bca9b5aec4aab52003c7ed96bdd27ef102a70e912
Commitment
405b836332349f681a50105cd097288e8dffecba4667c114f9ceb932fe79b55b
Range Proof
672 bytes (Bulletproof)
Memo
8319ed81220174f4bdbb050aec8dd7403255987169096cda092e665397f8ad365dd49a54ebf8170203b17865568dfbbd681392f00cac04f579ccd327ca21bd408ceaaacc53dafb1690f01a8f4d6ce9736bea367da85d682d3fb913167e76b7a36bfec22babd4d4ad9d6f5977e56d2a59d43c5a64b5e924b5469ada4b5b02b4eb (encrypted)
Stealth Address
36a942a8712db7d61e7f90c814899c294f657fe34b158fcead088af993746b64
Commitment
0253ddd38e2b715618360dd448d0892b1bb57254f6a88de70f8e8d7b6e584e58
Range Proof
672 bytes (Bulletproof)
Memo
fde67143a54118e224b6d4492764082fb6befe28fb27bd86f79fef55361635221cc4c5dc331f6547a2c6b56ab4ba4729886ea29212749a5439edb0dfeffbb2aebe58f8aafa91d4f4efca6313c6cfe921519770d6063cfcd4c0b9015bfc17eb8c38fe1557b9e52d1cceb9b0c7390c68b7e6e3c545149935b0129d2aa676ffe4ef (encrypted)
Stealth Address
04621722bdf439bcf1c2e6eb52b4e9c088a40221c499404916a457abfd62ab73
Commitment
de9ccdf860009a4f71e56c1427a2d78b25f49a448fcd44d159396c4355865d18
Range Proof
672 bytes (Bulletproof)
Memo
86b2f39a2b138505f33d7fb94cc303e18410d5c638f91d0329a01791176294d52aa8defaeb508180f07f713c4050bf2220e2f7873006e9271e6912d4302babd42861f9473b7ddfc65806b084ca9a96415c46d5c5121f534d28ca92eb578126df26badbc03b6a52e61e2c8ea5c1076847e67ef0a538d99de7989a66bbd4703160 (encrypted)