# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3c99f69f154048b434f5b9b0d8a386019c56121443a13f6679aae8130810d062
Pseudo Output
c4a64cf4fe4f2a412ffc3a0cab982c574f5ca25b58b2240c19114dec6bb83710
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c3eeff689060420535be2f4ba2502ef1662a429d9870990a57155d28e43fb37
Commitment
687161b10be0edfb82e327123e22db49d8e31d0b7be0faecfb42146b82ec3b7d
Range Proof
672 bytes (Bulletproof)
Memo
776b500d025dccd3fd237178e33020d248ceac8f99d56c9d70692c3fceff27fdd549ce355671ccaa50b3b22abf998d4177e80646bfa20428b4524f1bb6da2ba9bca00be75b9d0e124bc26c5150ff408a5e8094b911757f4d7c413957a1c87f3bc2e1554c932b9b5c08aa8450d5b652bfebd20551f67ada5a2287edbea6d7583a (encrypted)
Stealth Address
f05b32d928cb114100514c1f53450f00c6c3f4da5eeaa0dd0daed5d827ce2337
Commitment
04cae120e323e211662efd5af4959fed90c5b34784dd3f0a9f2e4e75e1516b4b
Range Proof
672 bytes (Bulletproof)
Memo
a7116a05c7c2cf1ac7c63e4070d05ea1a85bbfc6509d80cb76dd6d70c3281b5a869823eed291549d61cbe8a566fe7802f1df48cfd3f4fa5d779e059f16887d62fa6e4e4380a339f29693b7ab97e0f27069ed733f6182e7d230c600e61cf847b284cbde83a77881fb05c5f4bd0b614e68943103b7f9bc84094909a8e847bdd0cf (encrypted)
Stealth Address
76b6625808bb4cf0fc7ad1424e220719807c8a0f1f99932bb7987f51103e1744
Commitment
4e6f7d169fd52aa96e0db0d0c6ec3ee9f7dfa855faca450174b36d7501f44638
Range Proof
672 bytes (Bulletproof)
Memo
a7f1a1083ac831d47f7665a9f64a36b68efcd4ddd4fe0c0d2b5de82d3168edb53b470b4584bc6e5bc0f3cc3af3b58f85650742999f25c9467e79f8399001732911af6fb26a09d4abf77609df3c512bbf56d573963fb6a1fc5c27d7554cc76400e32c662a8151a16cbb1c53a6e8653e6d3f91bd82fe567ed23586831309b6f3ea (encrypted)