# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38fef7897b2651f5261f785b7172ae04405ac46d3ea7cb8902beb7fab557d75c
Pseudo Output
265ca41b2e69ee432392efa68f6b8b649a5280091e605694a9dc0cf03f0bb13c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c3b2af28be5627babffbc1bce8afb224aab36f07766b13fa2c4e0148c276755
Commitment
328d2069691b377711ae40d1de74c0393357cfcd773e26a45042d80300329c0f
Range Proof
672 bytes (Bulletproof)
Memo
2c954b468f6d297d5a84e119e895b25439faec098743c3a45ad3d99c2a5a47d5f469f43f7dba0295e4694bcd3e4b2c4132b68c55242e4a418f24aed53ede1f8e48d4146a3f6808ec50442e560c07c07d40ed85d119dfb69c71286c0b74d32a0cd4f1d1525bb42ad6099f1e8b013999aa11f6349aaa1ad83d2cb1c593ab390025 (encrypted)
Stealth Address
eabe12954647aa669394a61a732aa38efc184db2488a92be5bf472cf7db84a3e
Commitment
4294fddbddc703e1b7c85c9c1f2c64fa3fe56d3ef4f7a453de948e7a8c4bb905
Range Proof
672 bytes (Bulletproof)
Memo
a753869a7dd04174964eb7839b5ec534e53d1b088ba81dbbb84180aebffd975c5bbfacdea2868f83ee7b0217141adfd5dda4bd1ed9f85e005bee00411986ad640c9d4094c23637d35010791c4222d1cdcb15026326fe05b768aadd883d25566fa5196ffd6dc031e0dbea41906e403d996035dc06e1a53ff4899cbc5aba04b040 (encrypted)
Stealth Address
fc1094bf1c43df049eb8e2f7ab0fc46de1f00c079d7d9c90ec085efb9561ec03
Commitment
6eef8e65e46ef715d2db578c7a1f8db43578d79239ee5704a80f5672f5dff465
Range Proof
672 bytes (Bulletproof)
Memo
593bff44c9d75b356c7ccd332b8e0f186ac6f1b991f9191c2c8eb3504043d2af740824d56a8bb452c009f4dd823da02351be85a2399b6ba87ac1c3e882ab275c35d16e986a08b435f601cadb85a20a83a6ec50f3ed65ff38b88d005792cb9cacb354f000f75f1e1d1d8739fdc11166d4a7b96cd82bd6f99fe0681ff90da088e2 (encrypted)