# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c1c0d6ba2608e6e168a77a6fec4eda16b05a3e145ee0c899248b91a5f9e4029
Pseudo Output
2aa182ee2e44a2b9cc720658b7b420c197212ddf660c45966d5afde17a48026e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d4ef769344e8d6c9ea40fa74a12fb2f6ccac4ae4489f4ee0a88dffd01e1dbd60
Commitment
f49fea2099b20b2e026682f6582d1e3c7acd96b5bdd1305a92bd563e79ff6a42
Range Proof
672 bytes (Bulletproof)
Memo
4f5ebc4af87d4bac652883de2f8bd5b85bde733fc9a9195e9ac7bbdbc5143bb870b947cbe0d44bf6f72f526edb3b49034b61af4fee287d6f1424d075b39d4dab6e4958a9260701f312092009855707de6a6421da55927190548b9ce2e33aea006529877b47e8528e6a0eff38a592c4bd2fcccfcbf8bfd1472a2ea438d36aaf13 (encrypted)
Stealth Address
fe7377dc8ef8a1a592925e2f73e5a426a1127cae3ef5535ce29bed4c721d5268
Commitment
da3fcf09e8a8b0201cc9925353c3ee39e1eb64d2f0476f8ece8f5fb524064d1f
Range Proof
672 bytes (Bulletproof)
Memo
786a8e594b55c5a17f4a5a6016af80dc889be03036271fc1d750dc69b5468b0af91c174af777270315dd8b3830861540b8fc033c8143d2f384b48d76e89e1b2b7b61317cfd15452989fe670d0d5564e7cd0f48b486ddf53151e408af022d5c1bf0629a0797cfff6e3aff2e3b3b50bd4b2b82acc3cb17c8e2ddd94d02be5334dd (encrypted)
Stealth Address
24b75848aa2e6b39e26682cd81a7045742656d051427dbda8f54404fba0afb41
Commitment
7867c791ddd97b003f91a2e69a149708024950c49233cae4a9c3c75675bdd429
Range Proof
672 bytes (Bulletproof)
Memo
0617c28500b2ea6f89690562c04ec97b3e710f6a558abf7f28cebf4c98a714060fa8535484b245e8b2e62582fbfe5ae8e6103b96dd1771d874a894d8c260c7bb0cb293266bc227c6b7b0a719bfa8ae5642f8b11473fdbb9683191fbe51274da2e0bd0d89c7c299c5bb45d347bf5ecc4e8c3cd9e1e4da8966c7b474859ab81e1b (encrypted)