# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6e9185e47b355e1192c331d47875b792151afd581395b884ae2c886a4fa8570f
Pseudo Output
9628f25b5591d5a7472264b337f2a658c9f12a1175650108902f1a65cd712637
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f86ce394f09550e922115f17407462f533e7aff5fba384c42ef319ca06d9bd4a
Commitment
025bfdec68f9a716e0a674b212cb5c12b2f6600ad5760dbcc5d972b8a45d4a05
Range Proof
672 bytes (Bulletproof)
Memo
1b6ebd430b1cab40bb5cf68194888aaf3163dda6659f3d9a760bb0e261bc1ec37b9b3dd3c4f189ec7e75bcb8760c957e78ab62f29c8517b912249e46c895f848c457042f3d2364153aede108b02c73540f3be1550d29678989867ebc7aa44d2317c9dff18279323524d02355a57456e5cfc4507e251326f341c709deda676c97 (encrypted)
Stealth Address
b8a5d43908e7947078eb807c26493f4cbb06ad337ebaa5b53c81e484e83b413f
Commitment
10694c20f25e31d99f62022d1b438791f384f40fbf3b5bb4eab07f833630e063
Range Proof
672 bytes (Bulletproof)
Memo
89055b95ff35d9a0bc3a6a68a8e19bd65fb40429c6b1aa9cd875b5e180858f3f35cae168d3167e2aebd619755241dfc7e0d12ccc47c7c72afad9507a9919d1f938bc3970af856fe2cd9651accbd2b49d15772978f91f88806e8d0545c0d795f1ad95bf8344ec9df1ac906e8dc293109e11af44dbc0c68c5c48de4660b8f59440 (encrypted)
Stealth Address
40c7b10a68c661455130b64f43bbe3f63dc7bc437e157724dc4dce5a50251b10
Commitment
3a695477079a0fae5f4b96cc81eac238b592001ba268df11e63b56e1eea80f16
Range Proof
672 bytes (Bulletproof)
Memo
9640827c97adb4dced0b02f10dce48d7142f83755c254a39d5a449c2d7ec05be4e9ffb41cc610423520465ada715e35d6e23c7e916816c25de6f3c81b1a4f14acdbeb92ac66908b38bc5f7d536fe75f1816b7371b32e56e8628aa792d890d58dfd8c0d1325a71950d22517be2b7915d5006394b4cdb5b346b204e59a3ac467c4 (encrypted)