# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cec348efdb0d5be176853d572dfcf01d2bbbe65847d8e1e4120e81e7530e2f0e
Pseudo Output
b6bac241ab6c3d2ee91b1e7ff69e3f574780193c5d6cf39a464c932bde388a45
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c6cdb87c234255e7fedf406f5b82b6ae8b244d3265a84f50e2c275b3bbd80153
Commitment
30b1c96c7408fcf0b238ead27a9db9c4f776bdfe9840259df974314c32bade17
Range Proof
672 bytes (Bulletproof)
Memo
c97800464bdc101d3ea95b256069a909f05a52b5d5668d6267d77786409f01203704c9ba924dae5a0057ada4df76a595ffd6957aa8df7bb4e2254678d60de54f0d0e05b73b7ee218b08df5ce056afa780db725628a8322515985681dc652122f0ec076bd9677bf7696227a4fe89871c985878912ac4916f321498e1f444c0f5a (encrypted)
Stealth Address
36a2f96f4db7cb92bff02f6daf70e186e664bf89c765a1ae01956dba726cd869
Commitment
060b031665b1ced8b8fbaa59d02b0f9114854e24df947bb7de2e6b51d10a466c
Range Proof
672 bytes (Bulletproof)
Memo
7ab44426d75e50413613b83d4b921311fa0b8ba5afefb85b8ccc82ac6f42bbd887529039e2ab9191315905d14eb7917e90bd139f3f4c4ffdec713a0eb76ba17e0d7f88f7d8b2ccbcfae04b7cc935442136d27099a0799c626504559bc3899d4a42539affc0c697ba25d7d291823ad4ec175dcbfd050784235071662552d18536 (encrypted)