# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3651831a295a673f8c95c3ab4514ba05cb10b313b0dee19444ae9a00994b9c16
Pseudo Output
6aaa7c34b708a655d24a8ba9c8c86d57b526a2380802cf3e9645bc31efb50b4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
245331761c402d815dba8c65c955b4ac0126a4bee693ae24079fdcd2ccf77b07
Commitment
52534b46390a74fae268c9f5d4067daaf09811a0ec3eb43c2333fceda2fefc57
Range Proof
672 bytes (Bulletproof)
Memo
fcb1dec278d07d4122a3df185c38351ff8d9a8773a0238379d2d4440ab9a43230bdf2afbfa6ebf63edb4feacc72739303c5befa081eea90c82538ca32599d5d9327e178c9eab29671d90d537ba74d882376e8271a9006a31d034dae277fc9e424b5f20eaae6c5458a6a0f06f69d6126f114591f642bc20a2c12ebb2db6d77f86 (encrypted)
Stealth Address
0c6a7d57e5dc7d94f74f4d7ba357c2118afe32aa5b8cabd166b30d0ef7f1e950
Commitment
e0e071c89a24b6ec7b022d968156a85dc5d7c677a48f8e8970d5442374fafe11
Range Proof
672 bytes (Bulletproof)
Memo
e95cc2d4170327983445f5522e512c1aa1fd687e57baee39218c8626e8d4e70686ba57dfc436e0ed286927bd0563cb02953dd0939c0372c21b714b63252d1357b5780227f8505054e1921cd05cc5f5597f740014710e39fef2f52683f0450a711242393899b30c51764454fd0704f96b9ad17044f2acbb8bf5e9edd1757d4214 (encrypted)
Stealth Address
48c2a92fe4aaa069ed167449e3b4c06155067de94c7fe780a7a0136a9967ac72
Commitment
2a23db6c4b5fad8dccd16545298b9eae7a75783b25921d6e2c4cd98481e8d05f
Range Proof
672 bytes (Bulletproof)
Memo
f383a80288d4d665c5e4b567fb6c12902999633cd0c6cc250183832424bb51214711a4494b10e3aa9d5357df1707b8c392dc08155640ae19d9fd594be9da52902239567afcb992aea57cc8a13d2a839578e60821a9d7eef52a896461055c0cec1ad18d3afa07377be632976e3fca3d5f0b4053a9ef768f2c4001551023a92db7 (encrypted)