# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e85fc5a8132995e1ca89f9d0ca31769dbd2f5cbfa351342baedad8f032e832e
Pseudo Output
8c3bfc98d9192f0c66842cfa34f10dc8a4d26ee41e30ebb9fcd0ecdf67c02759
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
849191deb48d19a96cb92625d8f3a320b49f3a8350b83f435af900b196c3b579
Commitment
c6502dd02c6efdb5cde32c6fd464c42c3b25991cbb3244dd178bab9eebd5b271
Range Proof
672 bytes (Bulletproof)
Memo
2cf4fb3716bef28bb168ba76843d23c1359450d871191c99d540d80ae8108d95b3686c4d2a6e64a5b2581094948543339397b4606d9c4e55c0a8e27330d604f3809ce86149c2f315e02c66716aaa60ec05ff65ef28751d20b9a0efdfc2c4b6e29a4e3674ed4cd46b38034bcdaffbcde9b536db66f5a25a13812ae4c7a5a33054 (encrypted)
Stealth Address
aaa617f3aca80e2f568427636b9ac33bce65d9d581ba97a01c99bd13dae57a11
Commitment
b894fc5c14708692b77b119d65e586a289fe8acff28be0ece1ea3448e1669f0b
Range Proof
672 bytes (Bulletproof)
Memo
8c6b483968825382e84ea5f24d2a696f66b07279a11dda7861e022f84025d9c6599b394ef1a3ec8f26b539f0606a27736d04bfb66088bbb58c74a5bf4f4331a0c0e0d00e3817a527bbd49a477170e1bd9ae6931d2aae2b85d323b2e65f7b511e26cda59e132567a070a558b5db630300684d43576bfd36099831e4abb1cb9ad7 (encrypted)
Stealth Address
b0423ed284c7ea9720cb92b678aed3fe477b9472578edab0d0fd983f4702c721
Commitment
fa75e3b8e7071c5a2de83c2f8495eaf3bf15e37075fdecf82b8413cd87e17712
Range Proof
672 bytes (Bulletproof)
Memo
41ac6bac9a827f20ba81eb6f6387d5e97a2a751e27270f606e4c14ab6a8b65a0ea2b7bd4d98f79f5d6bd75001bd31ac753b17a85f4d6935a8a429edfcf07ad0c1ac344621c012e2050fd4c3b34509d42206727b08f21d6d321b6930bdbeaf9cf64e18618e7a499f8b84dfb1b9e821fa80a5a3d3873203e7fc77df998abb4b2b1 (encrypted)