# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6021458ebf9210b8fcd482e66dac17eb672e3ccacb50bc0cb2b4db7a0519c370
Pseudo Output
0010ab8648efd97fc94ee46339ac12e0ce1b4205f2f24c136841f0c318e85f1e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e8814fcc88644e640d0263e1939b144b82bafa287f3845f3cb85313e4a85433
Commitment
f83bb0c7f1317441ae26c41edfc2f80df4ee406802522db7092b70b022f63e39
Range Proof
672 bytes (Bulletproof)
Memo
aff8d40af280bb9b07ca6f6c88c5a8287e3ca9faca15b9243d280873968455a79ba9d73e9322bdc3f07db9417ced50e82c526884edec142ee8cbbe9375272cc6c479ba95d3e49812be5e8a8e4f0107572b1fd9a248fc7145e60fb1b02616653a9a4ca884d7f5ffaf915119ecbd3bdf9bc7920e9d84b43dd0f8b9f176eed7d70b (encrypted)
Stealth Address
6a91a6263df41dab240342e290bd1240b7eb3153fdcd9f6006c517be8a684e5e
Commitment
5ed5fe126fe973f19603852e2b5855b4b381be95a9ca5f618703a43e564d3430
Range Proof
672 bytes (Bulletproof)
Memo
408f3ab17077820ee3d19705868af2cbbde5d396c4797b049741884c495b6f1f48a45be2159f1e5b3938f1eb440f5d5f68245140ae18fee42c47fc22506e6d070aa8a4811921882f5b1aff615f413c881d01eb47e9bbef6fdbb3a4f7cbf8ec6e25bb73fde09b3d8a6adfa1023e905381b57809fcddd6841d79068acd1f2a3431 (encrypted)
Stealth Address
ac55d43bb929a48404c3de33223db19eed6502ac089976b0294b61a49448aa13
Commitment
0205c19a100a8f2275ab260b711db0afd085ea68ad067fe97d5fd826dc15b568
Range Proof
672 bytes (Bulletproof)
Memo
cba4cb542967975d39dfca95ac595610144893323e4dfd4d2639b86f025dd16265f57945c02f6cea47c5075a0a1bd5312768c348d43260fe011bd5356feda173c0435088df010c4484645a546e91af3a37b6e9dde784c10311fbe6c3fb0ab11a7e4be34e9ba6fcef717b066573824ef5c864abaffa8c3d0e261c96f6ad1ea6a9 (encrypted)