# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c0e51c5f56d7ffc593d3aaf3735cf6d0eaf13d02b80361009751bb61062b2913
Pseudo Output
3e71ab57825be8559bb7e4ae480b3f150096b25da11e2453aead3d64e6f5b62a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6a6d495bb337c5a5c1432485ec2c42fb57c6901d950cab07afff3535da29729
Commitment
2e1abd594e43c844392fa6610329f5f24d9641048fef6ec1740080ca2e6af01b
Range Proof
672 bytes (Bulletproof)
Memo
4fd42ff0b84adefd606f23d7d97433c10200898ffbf27efa3aba5813dfb04b0929b98b457552094ff0146b31949daad448fc6d31c013b72cb9d1e15d8fce2ef8c6c2b1a42c7c284f91c1eb2ea91c6d87d4c758d2995c7f00a2eda8f2666d4779aa6c0a5ecc6bce4c1de028b6c8cd1715e402aa648b303edf134fe5317eecf25f (encrypted)
Stealth Address
42af43c5071d6f6aadea3a95bf0ca2cc38f6ec93de7b90cd40a8cf0064a0ad29
Commitment
e6be33c35e09430b30f6b87bb36c2dace8a74d2ae456559af16c9fb2c8649437
Range Proof
672 bytes (Bulletproof)
Memo
00de19d874ff2726193bcec66e8309ba043655e30927dd45d90318b793982120c6c2aa79cd46d0ef29de11d9f23ebd3b94a7bb800eb5669ae35f01283ed4f7980185e9b91788aaf25fddddd8164f1210c191dba7abbe6e8b4c5e6520d1df08a6e07ce9abc2ae9732d2bc4607a3e4ed052d75002faddef0805587cb4edf35960a (encrypted)
Stealth Address
d0b9b98ccc77c376f15a72ffec937e5b3c6196d15f902dfa011f1facf9b49111
Commitment
96346bd0d730b960e648ba0e8b125ad85bfd830d5f9b62dadbfbeef010f7d30d
Range Proof
672 bytes (Bulletproof)
Memo
f94445f9c102be95dd0bd5b8fc6be14de24c50d73eb6a303e182610887b57011e68e1e445c3bf84f5bdb531e521322fbba20a778e7cafa3d47be49ed3ad36a12e663f9a2eacf9c1102a200e05b5a91a7a2c9de5e4c8694691abb7250511f0c5bf3e87e114bc91dd68695a5ea1c46d7edf15689482ff466915ad3f08b41c350ca (encrypted)