# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d8686bae38d46dccb04af61608ff0c67e89529416f5af05d357c2ede20835d4c
Pseudo Output
6c46cf92cbf7d62c51940a2e0760879c48fadab31e7f82d36868fbed6f064807
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
84cb3f13822b96262fd5c3ff011e9b3202d116b88d23fba35e570649071c4705
Commitment
3e157b6a153587b610724b706a040ea3fb0fed0cc865e8aae5603d6eac59325c
Range Proof
672 bytes (Bulletproof)
Memo
0306139b55a884f0a56a6e4eb6a6bcad57bc7bd88796b4220967d109065ac99f8e03f530d6cd270437241f6a65656be9065109b23e0e260fc3724948021870abf2859dc4393b49f3c52d3d76579c4d11fac05abc5b78ecf208fdb49eee1c40bfb772d39a938cac705ce65dcf106bdf00c3a6633f4329ee4f3b140d90bfd475e3 (encrypted)
Stealth Address
d2768ee3e93f42a353aa418566196faf9aa3ef29295bd7d523cda87e44abb75b
Commitment
f0a8cefa9ca49172c89b5e88ec73e85daa7d1c0714078bdb2268f6f26c2b3b10
Range Proof
672 bytes (Bulletproof)
Memo
4bfaeb9c2f6e9389476474235b3a4e9f929124f8766ddaffda40fa638e5f511791f544234eac4f821735e3b08d94af7c2ced37021edb009a39ef681562ab7a318ce4be5694a0772219265c23b48c470306c02441335efef04f89fb058d19f940ada171f217c04f0dfae1381f87e60d7bc89f40b6318b3e477b8554473bb41b98 (encrypted)
Stealth Address
82ed625e4befcc80480d0776402cfb4dcf24b4192252f151f60e1a86d7df0d4c
Commitment
922151a0a92e954b305705d9fb19acb654bcebb0081772892d0be58cad367100
Range Proof
672 bytes (Bulletproof)
Memo
279e18ba0c26cd6da42b0ae18f52952f27ebf021efd9616e8fa3aae9c0a2ca9d50b34a93d5534a1900a23fb7d53c8244d4712eb7e631478b228449f4c7cff40205aca9df936bb632460d4fa3f8e8f025d88747d87f0088fd470857334a9d1d5ba7604a51aba40a1d7b350c81f32bf054ca5879002cfcda3e84841f080158d968 (encrypted)