# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c2b177e26629eed2e226b491141b634af8446fe8c683464e83702b81427bf07
Pseudo Output
b44f26a8909101e30e94ac39d10eed711aa591996499935ec75937c47826db30
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ccbdc3f5c00f7682faefeacb2a14260bf575151761498bab8dc70b68d1ff743a
Commitment
c09e26244b9e0ab8b29eec06cbdbedd2e463fca6e24178002630bba468550f25
Range Proof
672 bytes (Bulletproof)
Memo
3945c037e76931c09d9986a501cdda335fc215e7f24243070291b6306b741a97a9171303962c98cd5245079ce5e6a88a8fb29077e515f41b2525bf47b43da7ddf98de57e7353499751520f0d2f8ec8816ee9ed73983fcecffff947440de59fc158fc940aacb9766c20965b77e1cb8a913a92630d04333c151f21c4c6d7f6507e (encrypted)
Stealth Address
14e2d8653d532a1f28ef9db674b1760af8bc2995e6b40f3c0cded465389f0858
Commitment
bc506c2c9a734bf823f4d285f10726ec389490b7d02cd79dfd69a10ef2999822
Range Proof
672 bytes (Bulletproof)
Memo
012c8c92d8e1e48836561a45e742fadfe069a1c1706b47d194dbb5d21579df16f00caa9481ecf3c27f177c76802242e6e5cda59c820a476089016ee619628596b3caa7f6aad08ed6fa5c12d70ef5f22c9f16d8c1420117043b5bfc47f51374211e5bc786f6688dc06d64eb92b216092a4fffcc008e3562dce228a792db2f1017 (encrypted)
Stealth Address
f4d27e11d6c0372bf7bb07b63477e2d56118ff231766c5d5c2413610e620dc7b
Commitment
b6a217fe7c383b8fe9a981f029f3aa4e3625076d090cb12df82634ef98381a4b
Range Proof
672 bytes (Bulletproof)
Memo
aa9cb98f3a6d5cf159821193cd162c455499a1e0529a307e9db8036e28a1ebe46ec75635f537aabf782e64b266b06848b54a9bc9e9cb8666eba86baf2194bcdece661d8e06e00b901af6361880edb80d13dabf11190c141dd1fd6d6929727a7601e4b385da4854bf81dc24465a31d8dc2e34a875a43d35f992c5a1974d41db8b (encrypted)