# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5a6553f398d3c71ae338cc7e893fb57d373a53e540af8f8e4b6e72d387d38c42
Pseudo Output
40187f77a55d661f5f83aee0af7dc8b7b540ee507a3154451edee3f4ee9e355f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c313365cab1f8ebdac79ea2ce6bc44fa1b5782dbb7e4dc6157965087a55df3f
Commitment
3a06d603f5fcca62093191ec5d9ae0e0e9f711709ec362bdf76631da94caaf21
Range Proof
672 bytes (Bulletproof)
Memo
8053d2438b3a36c99d70696db5fdd542b16599d2b8b29b8c30ac8f793f3a9d4c52eb3df39379dd9c26d889bdee29f70cc21332adc30ab0fe50d5f4e3fe322b6a9e3c31204b0c5919e504729f1ef9ce6c62cf63c91707751f4e578a7c31117b0fd12655237c5c911e2de5d534075f15b9b00287f443b80eebe146920145cce22e (encrypted)
Stealth Address
f872414319387c54b77d42cbf10b3a52b598ccd5034fb54e0429084cde650619
Commitment
bc652ec12f7b9d4f01bff572a86f7daccc61747ce27a8e4779d281af9871f913
Range Proof
672 bytes (Bulletproof)
Memo
cb6cad2a909f2403244888c78f059bff2b5234639891c97fa869797f35209993ee880ff49df3913675076e29a11b5db69cc12808a4692ca806fc2afb5659206ed7cec4ed6cb15db030adf1ad247c2c915f498dfafb1ec155119bfe7e96d45b862a2e45ad724df8f64c40a64cc228ca809b4930b7702bdc1dd15df66dc68ef94b (encrypted)
Stealth Address
3a2b37f42b10c3e5d7b39453eb84c60049f70af48ae34ab0410bd6a775f00c4c
Commitment
602bf42ee94a1a73b37ecccd01773fb132c2675ef304a3ecbeeccca2f51dc347
Range Proof
672 bytes (Bulletproof)
Memo
0e191fc080db3c123268c09b1af0fcc42f0f2654c5a4726bbe852e0344af2bf448f5feb680de086b0d0f1ba2e478fcf31551894c8747e2ca9c1716cceccb8364972915d4e9159df20ced59d745716c8b22c601e0353f39b42f1c6785a6c2b9c3039bf94cec3ae708c30c7e052968bc1bf2d62ad92aefeab913af485ac4d19c74 (encrypted)