# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e0ba692731e8d876ce0df89e5357c2fea1b914d97ac8f5c615018fb15fb8dd1b
Pseudo Output
a86a683ce66d6c697613c01339636906c5951583c133021733469a507b36c420
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6674b3624b75830d857fa4bf4b3a689aaa0a29ccbdb605f1c16a29313f551b78
Commitment
acbe8a716aa7ef114b1bdebafe659221131085f47b1d2b0f4b43ef76a48bbf55
Range Proof
672 bytes (Bulletproof)
Memo
92af9dd2ab7d8640e9cb0fb563653e5e2d2079bd67e16ec9df80144cc845185fb22efcd090de60d227aad18f60489fd7718cb97a054f5afddbd4ea5aef50202a0f8908e63f06b6b6ec539072e4d33d69a0bb8d401742a73bdcf83e3a5b018790ebeca087c03c100c24ef338616191cf6932f0ae400833f18fae3db9050ace410 (encrypted)
Stealth Address
6afb634bac3698ce7efc8f453b7cf43603bc9877f053ebce36107e8bf66f4368
Commitment
f0c2d726f897a77ce08f217af1909713b1288de45c41262cbdafa0dd48e8d035
Range Proof
672 bytes (Bulletproof)
Memo
58361f8451b5cafac25f539bf405432c1d3501d99f3dbe2a75c24d6429aabe2274514797ff19e9b73f2148808385a17f125b78c1941b15592ec71cccadfb03a4c7227dcce5ea1d827ccacbd68ce41e4f9ee120eb3cee06f32a2aa7d81e03adc35a7f057b5bcc5fa54e2cc294f636a713ef5051e6113d65727a6fdd01dc227562 (encrypted)
Stealth Address
60597830e76593e1482174d0707718d3fee011265125a4d66a5172d1022cd85f
Commitment
12ef9819c5ffc5e6a6d7e0e8e49ad336e7f9a189c7eca514c53c5cda93512d4a
Range Proof
672 bytes (Bulletproof)
Memo
cb75cb31e4ccd668e670763f602ef1a37ac041a975854c01d09506acf86e700896e4d8396d19c3075042471d76017246ccc444b4f98762d8656fa84932b28985d9de3e8207aea6d2299986caca1600cddb371f08c212ba0d0cec97270ac18d2b8d41fd32d28c564076ee34ab851c6e4acfec8566847515aeeabcd5b0c2b8b74b (encrypted)