# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6efd1fabb2d73a6b043884f809460ec39f82651b130d0977678e273c6dd6616d
Pseudo Output
266321cc05fb89f272d6f63c9d398a76b4b05c5f5152d6d3049afb7bb182312f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a251d8ffeba01aeee1c9a1fc420d664513261f3e1002988cc23d27f7157df4d
Commitment
7a41e371cf1ad09461072780d05c672612cd410f56752dcb6b9365b303420960
Range Proof
672 bytes (Bulletproof)
Memo
97b7ff2a5418db6aab049a80436ed44489e061acbdeb02f7f3c1cb92f6ae0f5f1d9a4b91f989dae4e21018103a0fd4997e74e309bb1dfea32e31af9444770dc2d5edc583a0815372ce4eb26099effde541fa9852415af882136521002ce05b2611b3c0fbf1338780050226c93b0788c680ff6f9cd4428ff50301d078980954a2 (encrypted)
Stealth Address
763883ba18bf1a8bc93a3fe196ae7714c3f5e26d3234a828df36b9cf9b639c49
Commitment
d0fc96a10d58894eb5506f79016a526c001c07e94f29f9b76a7c370c7b9da835
Range Proof
672 bytes (Bulletproof)
Memo
4d06db13e22e4366d90e8c2087cb024dc26591ef5493b904b510721a6fe19d51022b11ced46fd2cfb0cf3cc24a7f6bdce813a7ea4dad98e06739b661335f716e55694cf42d4c986ba60455df9954a80ff6d5cf94de2d500a36d2205f16954bc17f4eb40971d694dc88fe33081495b077bf5c69250ae00e02362095df0230d6e4 (encrypted)
Stealth Address
a8a3cae292fece426fde4d85d45c3ac4f9664fc778b2ba0d1fd7c030a4522d58
Commitment
fec907c64f91c247cee5fe23452110671780e77704f3803e19e415ca7b8ef904
Range Proof
672 bytes (Bulletproof)
Memo
5c09fb9f8034010d0ff5ff2d789cb36b3cae3e5e656c1ad5385f10547608be6a68a1c7e0972d076ef8bd7cd194b26b3cddeb26b861dcede4b890fc87ba0a2c2e2f1044e587abfdca6402129056b49819b2eeb3f976cdf98481fd4f198ed2dd9f7967db000f64d350466c9cb737e37f6deca06206f95e0ce40728045d843f1e0a (encrypted)