# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6804567cfe1a31d8dc2a9bd6192372f4670b2381e3bdc2503ac31bd5c19d893a
Pseudo Output
d21878f802c60eb8b89ab68d459d7f5d9359afcd839a6f214f015496460e7860
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e26331cd11d0cff3269e8806feeb9e56cbb20eb801945db95427ca011407c601
Commitment
d8b8e4f17157fd7acc66fed3fa2636171b6aa4fe295b548169a8a9c6b5021049
Range Proof
672 bytes (Bulletproof)
Memo
021d4465dfe7959f9465e2f5d58f649f460ced2cf1cdcffb5a6a474cdd6258c0c9bf90a508f4c41feab29a66a5ee52cc9ca6db48a30218cc22f045a0a23774ff0824b3a3ed24744eef64a1fa26b95c9f037a0f4a48dab5133aa4171207eb808d0ba01f0c951fc61b606d38b6418ebef8519ebe2e32490974f1ef7b5520e1b5b8 (encrypted)
Stealth Address
502387a8bfef92ff27881ffedc60b6c9c34c3864fdb4cc89d360f3209c679378
Commitment
486366b7759502b2af276e613e518cf899b59f0cae4307bffbac38fe59042016
Range Proof
672 bytes (Bulletproof)
Memo
16c0af917731a633213dca4f0f8afad9129b9442d93b3da451d9c847303dd349fa9622f6aa92fa41d8c83da08c5d2808392ac888618ea0ac93eec87a30d8618cf7ac9e5ec592d3b08532de05d674e2895810210cd951562d5f12120e47390a1288976182c34bef0bf5f49e197d59235faaca982717b223493a126c34ea520e1e (encrypted)
Stealth Address
d004c98f9ed7f4ae336568b64f0449b3cb5efec0ac4d783f8a67b79812eca512
Commitment
7206366c434265b51e9970256017072c2962f782effe6f148f5b0d220e05ac28
Range Proof
672 bytes (Bulletproof)
Memo
55e42a04df317198b58a7aaa3ae5f139e861a45ba2c6987adfcccbae29fab1075e3c7cc2eaf81df42db8d4def3faed8509299b7b1302c457641670ae257ab19adff28b46f208d85a64c9c1235c03bb2e353e06c65256e42a366c2e4d4a08ec20d9a1682154347ab4f09ed4de37d3438b0e7de8d67c198c4cbd091e3059e0e292 (encrypted)