# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa6365fa2ae22316ceb9c2977c43a7971284af6b6f33e65a4afcc4b1e3642915
Pseudo Output
8e6e8fbe1b0bac81344f60424aea20737bd5f1ae728c64c9fa28cecdd8c98614
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e6a22710f16f28cbc53894bca63fb7a18529181615c7aa336ef3eab650544b5e
Commitment
4a2b7c8ece0c95a0dab4a2b3a0a1074abedbfba94095a67fb37f5683f2da1a6e
Range Proof
672 bytes (Bulletproof)
Memo
98e32f36a1cd8bc77b4944790ba2d20eba65067b9228169a97eecf5bbcf7b4614498143f41e4d784f58e3cfb0f0c2aac29b034d4e2a42bdf693f78bd151b52034775105fd267c9958791e7af489706d1fb80954f4d6f5941a9cfd42ef07e9379d93453990ed01e4eabbbe9e3732e4511b02bc3a24dff7eecf376ad866f7d239e (encrypted)
Stealth Address
bea4ee13793e37493a3955cee0dce0a4d75cc47aca053badc1609ede2fa0790b
Commitment
5ce25102aa6c6280dee2e33e76f4ee8d2f0143042a15c0b02fd87b07dd6d0224
Range Proof
672 bytes (Bulletproof)
Memo
2ae66c8c8dff9785390d1b15e4f68cc4556b4a49e69ee9046a6e020644a415216012505155aa6889e6647045cb7a9d892c6d38deee177e5b0ea119319fff2cb53ac44f8a12f937c66beda3dde5ac8d31a9126d4d1c7a4171acc5e41e0eb83d9bd9e57702841d46b46edfaa1b9d69ff8c0bd12cb1701dc12d974a0200a39fece1 (encrypted)
Stealth Address
6aa26c8c03737d7c95a33122ea950c6abec191432d56c3184b2c49ebb6ba7863
Commitment
4c26b314aba76b6c9aaa7d19123e99832323dee857fb736279d0b6f1a820694c
Range Proof
672 bytes (Bulletproof)
Memo
c42cb0d78bbf64b505e3d7febd113c382183d73c80360b8beff5db7255431a25d9392319064bba75cdca7e4aa44f68cccc98a68b0d5d253ed190b6add9266d595be41fed40828bd6734c6f685a37d0e17f392a5b8d92cadd6d67dd64bbf7e9ace89e3b24b99adbc566fcf6ebc6ac4c450112aaed627d04b7f6e8d2f6bc8cedce (encrypted)