# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
621f3d5f068ec6e1d8ba1653a41a41909a3ffb916e8ba2d662a0e3b1fcf02311
Pseudo Output
600be78efe1732321a4a328cd5b92949c8e682dc535fcc411eb1c261036cf471
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d48c5479310f03209f2edf5f3f640b9a84535376954cd986c42885b061e8df31
Commitment
ecd466a13ea420e2bdea19a35647a8129a1c562b81f361502e43632f7fc6e51d
Range Proof
672 bytes (Bulletproof)
Memo
c5e4da256482dc9f6a1fb05df95b139da903069c727773e3a85e924ed8833b8041de81acc17dc039f75a48a79e83c5fe567837e79728a542ef42aa4d91fc98f0c534c79e0d206bed5f0c061ab22bc08818d51aaaf125ad44bde318068f5aaa3462680aa02217bfbda407f18eca77b5c987accc917504e347f06e37f423693b75 (encrypted)
Stealth Address
fc64e34828e5f59fe5e1c85724dc9843e5c2d8f23fd060bf2f13bbbf6768a954
Commitment
8ca52e1e0509bbdb2c0b09dc9165cb2e69ca9e4e1dbdccaadaa23b340b52a952
Range Proof
672 bytes (Bulletproof)
Memo
3620e463d84138044300ec834b43050531023d63d563adc72b5628cbafc957836778d2a52a63bb52d32ed88467ca5ea61f0d70c3143d36c645fe9afe35ad32553bc2f876bc8fb00b11bd15071e769f8cb36f79ca3f9945a64052b2994399952c3bf94a92240b05bb812887467ba0b77698b1c55d8162add772052393a2dbdeb1 (encrypted)
Stealth Address
022974eb77245120e6ca530a051af54f381d1fad0dedf9c606e2139fe1fd2d00
Commitment
6c661008a32d1072003ca3f1dc6f2d296ff5463cc5532d7f3d9b64e6dc64ca49
Range Proof
672 bytes (Bulletproof)
Memo
ea9c641765734f966f927e15cde02371a5dc4564dc71eb4dac94b9ff633d0dd54dd72408b0d99c922dcee108594b6a2e90a8cb00fafac9ba26f03bafd9a2c26aef40671081d04ce561f7778bbf60ac7547243ce80f9c2a83a23475f5bff59fa6554fd9454bbfd85bde4888883d9ac76b6e9bf6ab7529c8a561b2e51d44fea3e0 (encrypted)