# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2c3fb1ea96b7063e89f3e3a38d3274e0c8f393b530fa866e359166b5c31c0538
Pseudo Output
8a6994cb8ec7af5158d12d97755572eee148136e87ada745686abed54717a318
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6a70b6b9feda27637bf424f4d63e411291bdeadc67736f86ca7cffe0d6d80f61
Commitment
daccb55c19891c37c9d84ff8e9ffb3ac91acddd7bfcfeae439cbb9eabfbd331f
Range Proof
672 bytes (Bulletproof)
Memo
aee5cbafe016e71c54903a8215870e19058a80a3bed32679a74f7cb8d84f517cbafc8c4dcad3801b5a1519950f8949398c1ba53efc565d08a327f5a4d1e1ecab7e0dda4778ef41e8b6d2fb071b0943bcc1d7cf97b2270098d31eff2f42f8f85926b77852b92631124e9815dde8b0da391691dedd1a2bf8aebd5cf3baa5680708 (encrypted)
Stealth Address
2422f6394297d426f356fda4d108fc87fb40c1df2df0b2da99ea08ff8da88401
Commitment
d6e55fb5c19eb0407cd998b33f193e286fd2ed02019be8755fb22eee5731ea61
Range Proof
672 bytes (Bulletproof)
Memo
6dca27f9def1b611b67732b2a881c395521136a411dacc512531b98c08cd340467f9ccb617dcfb623ac287b27f9f26626b57a25af92d510fe85ac46b9b979d994cbacb5369d55431711160d37534b4cfbf3654debae9a4f45c3248ddabd612d8ca57a8b7cfd241af3346eb331f313e19f44320d1b81896a63d457c58ddb31681 (encrypted)
Stealth Address
862bfdd9b170272c2cba08dffb75b367bb293e736f9abec5bd64f2925239ca22
Commitment
e45b3de1ed4c9b3f66deab61dc567a26e80d6ee79152fa0af9175685f818d20b
Range Proof
672 bytes (Bulletproof)
Memo
5c57492a921869e4be57cdddf4b6407407216a22ebcfd98153179f277672e4625d6146dcd42f2bd12e1127b55c4805043aa1c353d636a9121771c0a69480e63eefe64d27e9b78a566f09ae943ac9b2e22d14ddbda8bf111200610f18aa71931dc4002a4a1356817c507604b0733ed476d0446291b3862e825c0b976b95b31a74 (encrypted)