# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c6e0cc9f83f5f94f759326f6b927d1fd497bb9139dacde74fe67cea3100ba360
Pseudo Output
ba6618624ee006aad74ba355aeed1e88713a25ee8ebf2729fc22f02a2c714e7f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d09f34cadce60dfbc33743bdb73a0b6068bb5d18f45d32a8010953173ac85e07
Commitment
c4e8cbcb4fc2d2a9ec5d0ee09ff5cce1137f5183a4f196778f34a5daa45c2558
Range Proof
672 bytes (Bulletproof)
Memo
5fe93dfdb564da03466ec381916ae258ea38f11796acfba74d3ad5d3448cd7fb2dba6a42d96297e30dc2e9d60583e1b565a3838a5cc1d5780d2f2ef61b6c08c118feabc077d51922c157fa683dbbad63b3efd0a7124389f895801bc6154d6e4c89d15aac75ae5ac10d855cc7b475683f59e65191561108ba102a2342f4d3b3e0 (encrypted)
Stealth Address
80d41bb514413b6a553e98974c56adc43174634d36a441a3902153f869e9bb3a
Commitment
ae8e5b3e1d442f6103b33c2660afedf70f94fb04ff2d206ceae8859fd05ce449
Range Proof
672 bytes (Bulletproof)
Memo
c6554a86fe09b3a4c3ff27dd1051496bf1990e3eb57346863dab417d9fbee115fc9c25af3a843b256e82993da992b455e71bf78b0173f90acf764a8df3ce25755066ff15ebfc12867973e791eafc0667bd1465377c7707b82f4da6438a4f6f8460ebd7b7fdc34d5cd2e930bb6df99f438fe9a5489f146ec82b82f76f7cfba2a8 (encrypted)
Stealth Address
66294fe9b0f50bacd28c1fd4930055cbcd894b4b98a1c3fe7859221db79cb25f
Commitment
e48b53ba598a998dbdcbfb723eee792781f42caad597c8d5092e86e56a066367
Range Proof
672 bytes (Bulletproof)
Memo
35c21109b69df6af86ab62fe6aa3b6ed93b09affef12e8a39689f35e0b3cacd8d1b21b19c981fa32d4a80394b444189f49504703d34ed1d41617cc56812e39f59b6d62a499ad5f1e5adae463ddd9e8cdf80883b4d16f22d770a1e7eb51e9b467a68fa888a683d20981c32f975e976345ccc76a34913d35f34491042075afd923 (encrypted)