# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
62de1c3e9f1bf0448c1023b407dcb283728155fc0789276ed23de636054a502b
Pseudo Output
f085d8b81702de1bbed90d611bbe13c4a20ff65285664cde5820cef805936104
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e6f64ccbfff803764e4fd4315877f440c46b4c92102d43cc1c3208dbe7104524
Commitment
923dcb77157984ff42c847b70da9cac901cac3c64ced39c4f275128e8040426d
Range Proof
672 bytes (Bulletproof)
Memo
1a0268f9344455e6eea02aaeef8ee8017f1dc05077afcbb9737c3ec8a1ccd87e7014d0de42ae1eaeb14df0a51b5ef512e8ad284b7f9412dda0d25317c79bfd57fabd6d319d2dcc587e41375a0ee43159b53515f07f87dad303948a883e21c00a58927213fdd457b3b2456f007d9ca7334c77876d9db7417896caef604e9ab8cc (encrypted)
Stealth Address
16fd0c939b1a99f7622c740a0e21a24424627a3d764d75276ebd0a14326e1039
Commitment
628f04f6a44a89349586997173d8e19ba7e2f329c7ab0a6b11f21df14548250a
Range Proof
672 bytes (Bulletproof)
Memo
0c7083a1b06c52d3200917c7251e3a6a08b9bfc24f77e81d48d930aaab2b352e1bf5ed1c7e0e8c682e45958fc304666b5b92780bacbb8401151b3d0abab3e46bacd33062ee5415c81e5265722784f73f9aa1296e60d99ea79f240469dddcc31a1253c01e195f81be24c0df2021db5f03bb9502b54c748a75fce1cba780b7a5c0 (encrypted)
Stealth Address
3c6997d5bba06a9b4b1088427eac092f5a6b4a55d3669bdc9fd74f1d9e7de005
Commitment
3afc4c44c801e5cc2c818f52d9bb4b0643a8fd46f615b6b78476a7c96c933430
Range Proof
672 bytes (Bulletproof)
Memo
07632c0671e22d3b699291680b7938606928d45c37f9f455d8234ddffab301d770ba7a0e575b82489b7c864f08bf95c119e6ea21c04a46d31f4d14d1eec28970f1264e847c354b7db8e102345086bff1a2b6c40804dc9eb6d08f49f7a76ebebdebc8c906c34e48179877159d91e168643127d8613a30ac1be54750c00f411ae3 (encrypted)