# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32e000d67c70170a6b9a1ff98220d6e54e359c298b3c2efb5f406cd0de8f2014
Pseudo Output
6c472a1e2356e61e1542e633dde948411f4a11cb9416bb69063d1df231f3281d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6ed87f6a1d95c5831b2bb4a16a5442e0ac8fd3bc818f9cc5f704a3c19faa7e5e
Commitment
b69b4408ffcb9c66008f3ec514f42d49a1bb0f115fab7b89c1b7a36f3ad15b27
Range Proof
672 bytes (Bulletproof)
Memo
778fc63ac5bf45a246ea8fe7a8d44a2f23ce7cb8949e3c822b09065846a99299aa03e8b6244599d713d330f0fbc82328a09131f2e0cb42c7340afecd0baf163331fc9f2b9de4b51f6e8fdaabcef172f0bcad5da2436a29bb873c999ec9faed1a44fcb98e0afbaf65ebe689f9fc7d498930550aa8fc9a96dfdcc3b2684ce3b425 (encrypted)
Stealth Address
e06b1064ef70de4fda7e9668cbd2e09a2bbc4bac3f8de29fedd8c56041605e0f
Commitment
1cf5eae3cb03090fb964a1c06b466ccceec6b619ecdc7c54494c4031086fcd17
Range Proof
672 bytes (Bulletproof)
Memo
6131615ff2b928959a7b8e48a69b92a3bb8806b316d8a6ccac206f2917c69d68b3d12e402db48167d111be7b35c6fb1fdf2f0e1ee37c2396a5e8fffad72a4e323ebdf8318a6f024ce020c68791809052a84c2d4024c0180496d38606ffe16abfaf4cfe8f472cff27cad779bc1ed5ae2907cfe58a6d29c9cd5211411cd3c189ba (encrypted)
Stealth Address
e4ecbceec14d837318837b47a3bcc5b4d3e9a37651b0dc332c56c26ade0ff117
Commitment
86da7bf75ffb1eaae4dd8b37f97073038bb2e820b4105054f3572d4757fc6c0f
Range Proof
672 bytes (Bulletproof)
Memo
1ce7bce6ebfb39ef1199e259aa3e565f760909b1b5cd6d5ecf7cbd47159c441765ab9a4307d71a396f8566a8f175e85ec4f9cabf9545843e7d8277458e7eb7c3877dd7a061cee06a2dcf10278b1c63b845899f09844eb887df116f3c6756b2efa989e7144d0c4d9a449223eaa2046c044e134bd1964e1f86857e7b1099723499 (encrypted)