# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aecb4d317b8c5a5497b3181df44a47c4f2d7caeeca0574587c825e3e77390602
Pseudo Output
6e8d0bae344d3a7118e976b555d6313b0e3344f6305717216c1777f6472b9600
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6e26be8dcc9715e4681bcb2f1a441d73c8105d0790f9d4023374a209d3300626
Commitment
4e4855d1235aaf12cfe6daff9fb3b59414fc5614191a1de977adbbff7181880d
Range Proof
672 bytes (Bulletproof)
Memo
434d996358682f6b7ec15a380c0f14c4f91609473cb2733464b4ee227d3e0d60671947c9081f874715ddf432e2a46a06739fb531d01643f70e239dd8a2212e7fc5d30cfd932a2ce6a03b770b4e383fb634746d2d953b18e7ea9a1a07c93ebc7a3382598c50300deecee23d38ba62a7b561994c7f572da66a57d734a513e0d68b (encrypted)
Stealth Address
cc9af522459525e872f7ee430f90a2bd747787e34f31af1fc7e1b410369c2514
Commitment
2a8b99d89e9ed93b488cbaa6244edc800555df943559e9e764c1c1a6aacadb56
Range Proof
672 bytes (Bulletproof)
Memo
1846b1bd50437b6eadd85177b0ab77e6425928c72a047dc5098c3b8cdd83cbf09bc3e6a3e08b57d620e39a9bc61f61017e437ef95b8ad75a374b573a2bc74a4c5cade8d23c624c9f6181c80214022d92f71811d606d580b0dc7a0d5e91df932a02683e0eb4bdc470bdde6e7e1531346a81f17071653db09cbac4e6dfe84b628d (encrypted)
Stealth Address
c01384116efa7789f4df93953bbdc371d44938f3298d088add1875f7d97c0169
Commitment
a88c6ce6c02145bc3724c974f5a53331ce7316852b1c5b7d40af64059a882861
Range Proof
672 bytes (Bulletproof)
Memo
6f256871b73d97d6cd101e7522b4d818fe525fd7e11724ae90dd9e9e517934bf592041cd158775248744a7a560c239fa897b70bab01606b26d35023ab4fa968301a3244fd7d82d7c7584865b027b335877af858f7fdeea04a168bf62026682a434b2dd172576aad28bef98aaa3623341c9df42876af0037a8ae133ab8f24d3f9 (encrypted)