# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e08aff363aee83dca0fc2ac00c74787004b86fc406f1a22f444630d85515b2b
Pseudo Output
d8d09e22d655142d855a9609b84a54d68354103ecb042608c88a044d16998163
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6a1b96d6047c2903be3dc04d30e978c5c064830910b1a650a7e0da8dbd33c60d
Commitment
1476c9a62368d48e25cc4c1c3b383a72cfd845754fb990e49890b76b5972736d
Range Proof
672 bytes (Bulletproof)
Memo
758b6c9436440f24e74c0d20bb9f68e84fd72bf3530ecd64608f33253d2750abca78b074dbcb1f7b7e276078bd416e2fe1b6e4b5ff1311ba95d2704715b80eaba74ddbe2dbed4d80b597497a6554e4246b7bd3769232d3b01e08ab938f35fc661496d320e59ed47a772f4c2508f1cf71c87f834e98fd183b15c1b2d35a8aab2a (encrypted)
Stealth Address
74d833d0ffd366f6ce3bd36ba068fa6e250ab978412cad1013db243b9475161f
Commitment
148f3c7b3ee0dbb177cb3ee7d84069090b41e1a42b1fa4fd1fe1cf9be27aa00c
Range Proof
672 bytes (Bulletproof)
Memo
4679e5d02d3df95e4d5685e140a8d99c76ab7319420fcf21a14a1a293192c1a8368fec711589ff8531b0f631f8b818995728af5d0ce0c972f20ff425b2adf54959dda05dc4c357c531a1067ccd13a8015f9e452763331fe7f4cef94bfd0c7d017c02aee7428d7235d6f83a98af26b9070b8402e4170bbac49546c385e1117a4a (encrypted)
Stealth Address
f40cd7b2eea7891f8f02e5d2808516ad529c6551ba015327eeff4466e1fc6351
Commitment
4a251ffc81dad3ba2d0e36b7643a6be77d08a8b77e8d5ca94e43f19b6df4dd55
Range Proof
672 bytes (Bulletproof)
Memo
ca6f75a744b009272443bc0941522fed389e9b95f73aeea326ad632162fdeec90a97b29fdf244db946ff8053eecab0191bf36cb01bf6807b51205e3931c7fda125721ed22e59f1dc10f72bb87876b04a6fbb7e2706596007ffbbc0e64f961da9a6e9bff940f12f90e662a4db6ce3cc60d3e96eaf0e1abb0ec5e2d553df0f3a8f (encrypted)