# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e1d8b49fd660ca4c48db42e3c364b3ae17903fe52ef548e4d7db0f69af4a07e
Pseudo Output
c4dae0d357e93069662d5e74ce5f4e6a8bd429b0ba134347e6ded9d589d0b241
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
966a01d70f41ba11bbb48811dfd2eaa4e7654338ae7c78fd963b1f8ae251e568
Commitment
6ac2d127c07d2ad3fd535ae7af5a6ed09c55880471f57dde34546d79c089d91c
Range Proof
672 bytes (Bulletproof)
Memo
6eddcb0cdae26c1d638aa4de323cca0e1d8952420d535db7cbe6fb0e00aaaed4f6bc15fe0a7dd960ae6f9a57c63ef5948b0bc56b85b1e4f3fdc711932f63bdfc28dfd242a2ad7ac46c5001ac0141fa049faf335728f01e3670e0d4f2f613e829b45c90c21ec4fa789228bdb724194ebcc904066c08a5f4f7e7af03c18f79d88b (encrypted)
Stealth Address
b4d36dfba87f16eda7053e59d56f9baa0b67b68575236ec3c63a7fd6c8ce8419
Commitment
0c90ac1746684a3f8f1dcd36e15c30ae0c3946e60fb92953ca41705b4d3f0d05
Range Proof
672 bytes (Bulletproof)
Memo
fd1a49c8ac36805ef0b05117fcc8d126001898ef12d6107154d45786af812d098ff86b658f0a3fcd567b7dc0f8e7921a5727972ecaa139f37621e977bda074531add6e64f316c32c2ae77ca7a82983b65fe8b976a616fa93c4542f31d2bb2c1fe5ce7eaac8b5329bfcad44c44d04b507dced28e3e861c0c5b5818939b3370331 (encrypted)
Stealth Address
02f4400e858d1a5489d0ba364ab8c45755007c243cbd2ada8ee891a150ca817e
Commitment
ce381ff6e153db21df4481f61f5acd1b7d6787ee87bddfb429e253b9cab1317b
Range Proof
672 bytes (Bulletproof)
Memo
3a5b1d3f965f93e009847d325d3c5d8cd10cf44b7efc2db41e3ebb370837b21807c53795f8435e94f231680f5f4b47ace0385c2ebac61fcce02355b230cf623fb9c286b74c512c61b9eb7911f2b0559fc11416ad1c7008c14f0985f7949180ac96ebd51b397ffdd4353a803ce6ade4ee3b619fcff741eac25c9e6512b30e1b48 (encrypted)