# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bcbfc31cc78255877dce7c123f8666e0ed5e2a51c98f5247b804fa43290f5c1f
Pseudo Output
46c5c54ffd64b664d3b80c7fb9c031a090d2bce1cd48c6174e1986526d403e5d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
84b97b51bf2dab6ab8869fba8cf862069445f2eccd30b457db49f4b74b432842
Commitment
d62b72c66652377725e409e762e9e55adc3298e5a89fcb7fcc0b611755a9906b
Range Proof
672 bytes (Bulletproof)
Memo
dc2a289c4e88416af9649c80f59dca9c02f739051cc9531c0671b9b14baee819427716ed131cf57b0efe2ec9d54a944e53af1b39954742374e7424e526aff13f114f6231b3ab407555c799fc0f4ec943a56cc5452f053a2064710dd12f8bec471f117d8509775761bbff8b9bbbe32ac0bf92ee936d1d61cf2b48358a639a69f1 (encrypted)
Stealth Address
3c34b480fc4542d46832e2e72b81b4b69cc1c505931cd9ed57b71cef8e909058
Commitment
da1c5cd06bbb832df4114bca375c6fcb8493e6980275eb417bb53a41fc9a4d29
Range Proof
672 bytes (Bulletproof)
Memo
98ddd2b9c8c522d7483f0e2da14ce4046d00f3adb6d638db1c58bc5a81d49e214611c95e0137c8ebef0781622316ee1e8e8fbebbd0b129f32326c08b31840c8a7d3a865216f4d37b3461dcc388b8cafcdcc740a895b5b8604cd777962a1a9d9ed7a53e8c14b2a374a5612ed1540cfc7798233f4ab0d324f9af2bb6bbbbbdaeca (encrypted)
Stealth Address
c0762fe4d6d593d6dc9b7da2f1004794bc6139ad06c05d8fd339613d9eb9046b
Commitment
30049af02a03165fc03fa0635afabd5365c4481634ca79c349ef4d6ce46d5249
Range Proof
672 bytes (Bulletproof)
Memo
56a8f2f606c930ee02f6b8e38ab2a9418c953a9daa6c095f7f4f2da29d5924cb72ec7e466d95d35d7cca3cf23f839edb7fbff8083fa8394542e4610ea8f5468f621cbfa2092b7b2ef4e6453f934d58a737cfa29d78b0602fd6c547142c0d2285711b5c6b8e7448dbbf5d6226310c9c6b6cccb1c38cd98be3fa2ae6fec377214c (encrypted)