# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d4df46d4765a1c173187968be82cb859c815ed1ecc7dafda1146599be811fc2b
Pseudo Output
8eea5103fe063b2b6045ee31aa4e43ea7262fd4719436f0fe9d40ed85c284e44
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f6fa26b2aec66f02278b2722bbbf6b5e294ac17d3ab37c8b6453768d78b06d34
Commitment
0c51b17dfaf08437850e240625afca7e2d798b0a0f542f12f8859c242109e823
Range Proof
672 bytes (Bulletproof)
Memo
6def506f084d22371ed2957f82ca7005fd3876a51c221aada5c7f1005607afe8851c5657cc8abddfa3bd41551927ecbd0024ec20c5b9c78330aa0b0f5b1e4754c950e90be4f30b193d4b230609d5f6be97b2eef65eeb335c9f2a95da762d4007e4b45bd03df974b7700d9df3a9379ea21b377479a9d9a39b560cb5ca997c649c (encrypted)
Stealth Address
328f204f8073059a8cd2be0b750e9fab8518adf235cf119251152f28f8a98473
Commitment
70a9ae36869f3ec1f0c319ce7a26a8a506810720786d15a2529ca458c4f77701
Range Proof
672 bytes (Bulletproof)
Memo
fede4181604bc04ffb4c796c0c79ee63aa35fb381f66ed4fb3d2307f848b39095c219ad74d9e1d267bbf3bb6b2c711f91ade9a4f31e2be85641df8d900336a810a59e6d1b3595f6cf8816cc764a7f7af622e1f6f75504b0e4f0b47bcf40d3ea31b98b1e5715fa4745c8278b21aa9fc2eea5213130364a103651ab98c1a754809 (encrypted)
Stealth Address
e22187a34ac76ad2533f0787fd9520cbceaf5c7ed3fe3265be8c8fdf9ac75804
Commitment
2e74e26500acc50fa18e39d1d397e076f0ba6ace0738fb4b6b9fad60b8ebe43b
Range Proof
672 bytes (Bulletproof)
Memo
61e793d803e6e0b8c76c1be67516495701521c7a96d2b811c9c67f030583af6198a58d1d72f5cc8e1efbff8bf830648eb91aa8521765a646d5e8d8b843ec1fa4b941ba5f66b3ad770a072eb2a2d9a6eaf0c4e1a2111093e8e340ff8e76a5b4acb2af7d3cc615339440ba5fa3c8a396abd51d843ce6238ddeac3bb1edffc61eb8 (encrypted)