# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aae72736263b5e9e609b6cc5386ea5a4371c13230448546d8c19cb6be6940f4f
Pseudo Output
6ed84559d8efe4494aa3d7fb4e8eb6b78e67c6be306cef699e78dbaa4d887d6b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3cc9f643dc2a264157644a5debe71fc2171c1919f893eb601e8b9af5e85a7c61
Commitment
46aaa2f69be201523c24b30b46592fe8167d9f0b15bddf88467b469192f2526b
Range Proof
672 bytes (Bulletproof)
Memo
95bd9bf130ea31bf578a7ea4feb772127b1434d812786880b917af4a67469ae948d0ffcb50462d07704218b31053116d29e459ac358b287646662d92ad86140570b971fa58f644637ad2777ecd3a6ab4b4a4a2515f6f7f1da53b360897e7ce08dd55bb2b7e5fd4789834e4ff1560387467ff5f930418ad591644c86e16dbea72 (encrypted)
Stealth Address
948d7f2fdc8fac91a432e1795f74b17b11025d7f95e845bffe1deb8901c84e63
Commitment
14d24da1f441fc1756f65a762b175101955e87db18db00cefa86c011a924ba17
Range Proof
672 bytes (Bulletproof)
Memo
3be1c26bc09105adfae31591bb23c2c428c47007d6037fd58e7023a4715c7e4a271370e39cdc68b395558cc406074dda8e42602446e0baa1d86ab2ee34c157b86d2d15c16854a82b44ddac5d1ed4e56b88902b441b45553556e3303734eac6b318152dfd9bc359321e64bd9bb4db3830c94a0d38338328b0b9032f9d55fd6636 (encrypted)
Stealth Address
c6a014873d1cf69d4ceaeb3dd33a53e8abf29fbb077a3ae5fff9b0bf5fd67637
Commitment
aac5d9ca2a9fec72473a9f582502add1b5a6a112f94d60be78766a1f5bc5e757
Range Proof
672 bytes (Bulletproof)
Memo
2085a449f506c06494133c057d760d1fef3e2e00dbd4525d4daecc2ac2150dd5260173aee77e0a1b42d22c162d821bc1cbc460b424c259539ed2808af098555a4f69fcbc5c5af649d42fb134bf47a57fd443ed1c03893128041f4d09b8cedb2b6e141867e037d9ab80725ba18705ba0bba2fb0c1a0ecc68e66099a40ce8e36bb (encrypted)