# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f20f2a45f77c3fae904882aef68627cfff1ef80b5875dc1176938babd8156f0c
Pseudo Output
aadb2d6d393b5c34e006b09291078045269c4c1205e8a3b2105b34d1f469b753
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6047c5453fd411c51ceeb76607b179af986c7f8b61adae25f66b4343050a2123
Commitment
06d0445e31b2c232bbe660c9e8e6158321ae783108f627e3ab359498981acd6a
Range Proof
672 bytes (Bulletproof)
Memo
0b36b99893a510a26c5e56026e76f7ff4f4c4670ab82fb61f611d5ef650dc317957b6e4fa9e181bd2c745a2390c22149cfefeee669cf5a3714c681673b2c7bbcf9e2622dca3469f5d31084c6c739471db8a9f9c0fd3e9bb1b6219db8f4307635a318f4af3bad5e38b473186a23425bb79c9ba367f97c3bc2ecfc8cde37b48404 (encrypted)
Stealth Address
288307e6e13b894acc101128797994a1381f2685c6ebbe5e05829c1da570d370
Commitment
a63b9d0d861dbf4e29922abfb912168d07f39d5b9b72f59c3412a8caab10ac5c
Range Proof
672 bytes (Bulletproof)
Memo
d4f74c9da0852305a4fac817898df32313118bd783ee86431abfe0dc872e9946fdd03ce21d46065c9cb1b75cd9cc46d70ba111ec4ae40f38ffad9bcf67052286e7f7d91785c2db59e1cbce3232371b0b5745f7f4f2157eb7a54f759a2e3eae6a1424c7ee8655d4b4cc6aab26591aa4629e588ad2bad4a1eda987d1c933005d52 (encrypted)
Stealth Address
56878384857795f8120d2cfbc5b5941ad3f16f8a70d706d82a1fa3983efadd70
Commitment
6ab8545e033700f503a0511b030861f22684876cfd7f7c550f4023af2793f74e
Range Proof
672 bytes (Bulletproof)
Memo
6964e71d99a51d2f0671cc986f297ceafdecc986f289be211cdb77185d9f3f6de9a7d7846b837eb714cabafd31ea10ce057f2f9e6450bb293e1d1a170511a4dea7f1a721ded18422a93b175a607f3744f0d9d9e0f0b7b92933421a54bd7d9b289d942e0388484398b115a2ba0975c7fac7e223e54b5bbcca33e227dc1969fc38 (encrypted)