# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6e9b15b3bffd7ae65303f15a437a5a01bd6f827f5262f8e0614d32681ff4e96e
Pseudo Output
563b39c2f4e0372a1b1da0afbd30043e977ae7b623dd21533c47a14fd0ab246b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dca1d8476abd9f6528470e3900fe88cccb2ee06d2dc3444430b7657ac2e03d6f
Commitment
3471d489646b83b9a03f52eaea523cab5afd272a1748ae947717c2617769ce67
Range Proof
672 bytes (Bulletproof)
Memo
6f45afe859687704a72e58b7fd52975896277c7ce555479c2656f52ff408728a55d51a590f1b08ae14d190148b96463cb8eee2b72a7f1102644a77499ee314488a7fa9eb0e0103fb865044265185853186003184ed85afe9fbf0115a156e4d4fe828335b0475676bc442f2354ed14145e9bdf9e7b3df545052f761933064800d (encrypted)
Stealth Address
1ecc1122bc0a2d3f09b1a126bb657faae7023a0a27e3440ac3e9ff38d4989b04
Commitment
dc7b871d986d1dc91f6949c1bec284048a7f0d83b62343b7398766a3f046702c
Range Proof
672 bytes (Bulletproof)
Memo
711ce8d08483dbf3cf1c574126c142cefaffd8c92dde1f3da13f5990cf125de3c0d9414b4986bf58a994ee2eb7faae7b4316472bdc9ba23481e6ab1aaa6e944e84c0ed784a8593b907e4600aa286e0d73bebaa5170590f784cd453b1aa3c9dcaca5cffcd70e87cc60b3eaae86563a5f9eba38e71daa9844c31aa18bf2feb1081 (encrypted)
Stealth Address
b6e1c48e8142883f728b8a0f646b4eb8a030d49152716bfa8af0978e8e348d05
Commitment
e8a9774bb21f3369fd76954e50f3db491a55060cc605cd96b08b744a4084620c
Range Proof
672 bytes (Bulletproof)
Memo
e8e433a50d65223b9fb5d63e047551e59359f0cd1e10b289386e13c82fae48b522ccf461caf81970e38cf2f1f32ecaed0347f6f066a13ba9d57cb7b985ba1cfb8d018d177f620ad947403733ae6e38aa2e4901035f74948489a77651e6923dffd2bdb03d7c1aa20f03c08bd8bccc45632e88d53c636032e265703ea817556cca (encrypted)