# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c6ffeaeb87b9186f6a347f2a0c1ed066aec5efba00525f0e28a1eb305820022
Pseudo Output
a2c6a2bd9e49410932d46d8564bec96ab787cfb3421566d4ccdfc3cb59d2c25d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b6fa847ec8f5b3e501623e97e7324fbc1f298afab4bdb370b9f81dc78945f945
Commitment
b47192482963daae65ea7d01716c1dcedc6b92fec75014a57bbc3d6bec8d9c7a
Range Proof
672 bytes (Bulletproof)
Memo
3e85035fd02d76e7dbb66b8738cf8ec453581aba2b96280ae916fc228bac2b202f9bb71a5fc50c3c8f3830ee672fe3aa1fab3dc498ebb779584c7db2011791be0f6ee83a9e7f4014052f52c61757127bcd9c61f0164d95be04e0872b873ff6812ed0fbf14905adfa6c7a17590cf434ed4b4f7c30459a6b6f2a7cb8ddc0a784fd (encrypted)
Stealth Address
4637001cc35195255a17f00f4c2d0ab9850eed2bf143edda2f2581e4685e2679
Commitment
d2c94475546f6ecc540d43f2b2ece432e95df902a069ebe11df032f1f391ad45
Range Proof
672 bytes (Bulletproof)
Memo
93718ad6cd4bceedea472d55cda8aa54bd18da4c1fed6c76b600f1c8be067870ef41c197870e7920d8f531e50c2dd9e03428f42c34fdaa7db1a25f8a4dc40666a2051521027bf5af7229f86accbe330335c9b1df7bd0df254171a0c6d49d2af45a0e70f785414b9ffdf5a0e1667c1cec0c930a49f52c4706148c3b81840268c1 (encrypted)
Stealth Address
5613b8749aa8c1bb0cb8187b1b4099a8d6450a1fba6cb6d8358e66a2c413e117
Commitment
72aadfa9f780c8cff54e784aaee6247c2dd9afc65ad84e0da2974fde34a9f072
Range Proof
672 bytes (Bulletproof)
Memo
445c38277ce58ce51eb4394c7a720131992a856bab995998b0990fde56b6e6ad62a9c8f3deee2cb464aeff180493dc642485937c0d4a96ab59c179634d0100d9aef02771274a4881f78f477d08e66372875f90c04e16464b36ccf187b40025dcf1c2b0ecc2e20a89113212b4308b7288e560ff5df09dc440d23e09a167830ee4 (encrypted)