# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
64aa07207c4d93c971c59b10f63051eeaa7d6f94eafa6d2536c548b6eb3e753b
Pseudo Output
36c2be6e709062d82423bcd85252a44d57f960d99fee3e1439a973405514a912
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f6cd6dce1fa5b7c2a1f8e9f42a4e8ddf57580a0cc03f7853ed2266daac5c9f33
Commitment
7047322981c1e20637cf0606981c0a35d71443a97ab3de381738d55637779d4b
Range Proof
672 bytes (Bulletproof)
Memo
f6156c7ad7a960e57bbb20a31d87ff8fad6ab198a99138e6c984186ee1947e189034a5a161638a418a9d98a6384dae5d744ed43d75e9670fa81b1fbd819fd41385551678e671a210074371b0e5758353747313042dac766d2379b5ff0fb28fcd19a54fa2f44e470c8b4f1196d5f4058ce0e43367f584694bbebd1a0261e00c7e (encrypted)
Stealth Address
dc67a2b7637bc45452a59c45017c21708e277be2635f550d76776e221ed93366
Commitment
cc95fe18c133222ea480fddfcaab177e18662a524280daff0d94a7fe5e997419
Range Proof
672 bytes (Bulletproof)
Memo
3bb0eb8efdb6aa0f2349d19f4d7e90de52545fd0e2b4ba35f4fcb61976ad105534bc53803702e389b2d3883dffcb7e6f1a144e7c5700c13d8f9ee37f962fa63070db0792688305ef92a52441fbdf294429d8fdd2bf878e8ea7a620fe309587b9d4a011783f5d00b1c772a2910207ec53241042e18b1f2ae4f2cdacf6a22a4128 (encrypted)
Stealth Address
d00c75d93c1b37ecf9367662daa2d5fc300a7abe1c3a79d4b55bdcf9807d6039
Commitment
361de81139306a03c5f889362acc76eb133c44ab9122f3222fa78df85321be13
Range Proof
672 bytes (Bulletproof)
Memo
49378accba22654d0e9ad069f7cf8cd55c3872cdfa838ee02c8e273ee3b82373b25c053efc25e6cb25116018786345da775c749f71d38a0a2a5ccac16a3f4b4f85a2ae0e562818b70551567ba1c10a41fdfd8a5197086f286e848139af1a9d7c0bb43a86f2204868ba98804c302dfcd52ae12b5b4a5c3e77fc92e381869c244f (encrypted)