# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4ae3f645bef77138db3838ee6a8ac7cd538fddef826a552dd65319dda9ef4053
Pseudo Output
b076d08e3e9b6db739b4d493d777c278c40e4cc80f114fd52fe0bb7efa2e9a25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6e4db4491bcdc185e3a901ad3c1761661e9855c8a03a8ae1fc348df0f8502142
Commitment
1caf7aa2aaa57bada08f5ba627356245b7c66f22f42db18a02b566d0258a5938
Range Proof
672 bytes (Bulletproof)
Memo
a351ab24b3b1f8d6e90f3f8cdd9aad08a300cf88ffb10ec48a1ab95cde7297a983e697e558f7858ba06576b73e4d913e57e11557fc89d3ad0e18045f2aa31bc542a1d3de8d60785a794085d9bf56f063e2aca419b1e815e0ff70a1a92556681f46f05d3a33f1db2819019e47fac319150bf2f48d1ab102d8509030eaca2944dc (encrypted)
Stealth Address
3e2f496e1bd49df6f2489d63336e11ff062a94fcf4c7d40dba42065b1358100d
Commitment
18dbb3dd527a9115eb897ba1cb7e79d29e1465f4c27d7e066886b35d0334f971
Range Proof
672 bytes (Bulletproof)
Memo
7bb26e80d9ced0373a5162f71d4eaa7e1ab90eeda160cd959fe4a108963aff707291cb08e9a4d16bd4c686f3f0dfde6cdbf3e971c7ce2935bd138e5f54177fba8f81768dce6dd267d48628f02f6467511f4a70f1d4f3aa691157f36cb87b51b1fd7fcf5b847b40bd5209898fe5fd922a4f760cd86af7ee7bb85d5f74e6f98d28 (encrypted)