# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
006e89585964a1dcc9425158a08b11e7256fd64d9ac6b6278f5fe00f2873eb0e
Pseudo Output
729453c65813e4883b9e98ec9b5a83f7bf074377065493b5e3b0a8853a7ebb47
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c0b6efa798e867cf6833a7afff788f576965d9ba246451f332a26f3e3035a206
Commitment
f6619541bbc91830e2da31a205386acb19a1831b41d7f8cefd1cbc166c126860
Range Proof
672 bytes (Bulletproof)
Memo
830c4fa42498453a5c0db7ae187ec3ca2dcb8c92d901a419728ce539c60a1d2943e0d45a496df37c585df4c02247481744b1344234a38d81023ca0846d9252001d3a86f8429ea6f2d5b9ee62f7533449ae96b5a194e4d7ea92c681e72f1d466a29330bdcee794ddc6b5a185ba08cab372612f173de9caf7f02c30858672338b7 (encrypted)
Stealth Address
36f05a452495fab61387b781a8b8d10c533cfc4757e490992e233a0711a1c737
Commitment
4e9e16f4f712788a5fe3e6113b63de57ea052eae87e16183c55a65ff3609a43a
Range Proof
672 bytes (Bulletproof)
Memo
ddc8c637f8548cea2dbce717f336f40c3217285e41be44847f9e525d47cf175c69ca59f0f608625ae9d43449c4a80b6ac04cc7bc566747a914c641aff0196e129df1d434e37ed70dff06a383b6497010937fdbe1d7eace7f0248bc826b541c1a0d20569c7cc73a793af9886f0d4dbab521fba010bbdd365cadbc192df26fedd8 (encrypted)
Stealth Address
5c131c908cbd1ebab0bbe7633296c5938fe82575038b2b1ef2ea2121f9c74403
Commitment
cefb67a673a293c39aa088af3a22a3b58d825d5fbf450d7571d9e7d43c169c2e
Range Proof
672 bytes (Bulletproof)
Memo
53153467821e2ef3b0595fed72da32848e596badcb3cfd6ade8015962999b8fc7fcb3849459cc6f52c66bcb456faaad64963225f8329bdfd469be29514e361bfaa0f17dc2efe854c2a6e50f1d16d3fddd1745df9e3c00d97ff23909a23c6137c4dd3b24944fcf62dc269fefc7d3ca6cc6a7b6f8901080ad286ea8f4414a52b40 (encrypted)