# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c1ded24b85d3b30e7ac688d01e7a5785d242d4f9c98214e6aa1c07eeb77a36a
Pseudo Output
00039e2ecb14058acce0bf1fb5fc8838496fa585c0aa231583d2a349db4a8902
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4219551afc3933959cdf6783ae56a82da63da4fa32bf9331099289e8f8b6524e
Commitment
b8b12cb8a4de0bbc8c9d622ac617e222133852a326f41d9d08598606d891467f
Range Proof
672 bytes (Bulletproof)
Memo
b6e388910264efaff0801f413a675a348962d4aa4614e564199bc619bdb2dfb30cd3815b4c71ddaded7fdedb6abd18c5ab35add175f442bb3864e1325ccc28cf0d798bca8c870fa44e64d93718c11147e8270666bffdfba3c1ea41c364a0025d093364fb30ea7e290391eb5e72e1602c411457df4bfe3b80c396e699750ef7e0 (encrypted)
Stealth Address
a87baf7106c138bae7b2d6cc98ba77eb48faba69e77c73b06c9a74d45f88ff04
Commitment
803a782dbf710ed6a52f0eba5dbf76a702b555d049fc92f4a4b2bc5f61ee9f0b
Range Proof
672 bytes (Bulletproof)
Memo
0dff35d2664cdabe26c5aa6a910a85bacd110dfa7fbed2786459bad45559c2884783ee3a87f2d984088c838c5e268939be143acd9c3f5aa5920e4c8edc391a744b57d203bf354fd04af11117dca9e63c493599e6a55f0ce8c5e8268ea9cc3f46a2e03dc8dbf69f1aeb8ce2f5e0149b071966075acc918e9cf382f4c682d079d9 (encrypted)
Stealth Address
0e6d8731fbdbcc35288b76e46d3e8f68699f2366b41b5b6b2d0e3e1ef202c628
Commitment
628cfe4b82839ffb10b2e604ae4eb3e7c5c4a34e0daecad6d2b80a80ef1f053c
Range Proof
672 bytes (Bulletproof)
Memo
1f4e8bd4e7ec9a67420dc7ba0a2ffeddd7fc8f010ca10c2d9c5fb9a698d4a87c899a07cb203901214031f7d44b26cc0415c92e0cf0643c8d787b1783905d16ae65869099ce3897a0fe6549b091a5a95527be6d4d8edef028258a907ac069c8a956c74404e0f59d82b36a8f95c565b2c8416a0b04a73278c79c8ee11b838a7e0d (encrypted)