# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c835cbf53a4a3c2473553776a9458385379ebca0bbb8552e3cab5e9c82dbe91b
Pseudo Output
1e6e5de08a531be8a7d3b969ef9041e3fc5d86cd6c0214eff36c17fc408b3739
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c9d17ba527a30599658293a66ad1c8ae8267a19f2f58df1914e780ec5b4830f
Commitment
7229c1445d3443032a04ae7c3ea92d9aa92deaaf034f5146fb83dc7b31de4032
Range Proof
672 bytes (Bulletproof)
Memo
dea274d34ddaae9ef3a6ad73f190c74f5204c09278d55ba67e685e5b991b807b80da28c909654df1a39b6a3aeed5fd31146bfd8f9f093d5e07fb9d69851052ed2e1544be9a0a2c8ad66287634c58d899a46c7f4779ddb978744a6ce245b04bd879b5d07a054ed558b7b0557670574b80908994d07a7015c099e9e3db6845f6f6 (encrypted)
Stealth Address
a0265625548fd4ec3556c773feb138d24521e0305ada338d99797fd4bc241e08
Commitment
0e83e2c35368468f24629abf0b798b3b41cc528ec54b02dc887da75a207f3d00
Range Proof
672 bytes (Bulletproof)
Memo
416ff399cc0ab74ef3c6927faeb222ff0fd31589c1a0b1619f5bed892fe359faa96e1bff6ee38f7e3268e64667123c42953e0d44472f1d5d1a64b3485ae19c7631347151e41233311f5758d122d7a050a47a9fa88b780b779e0cb96094c88a12426953dcf6c4389010ed38219da1e0681327a9803ab3b65fa64e280dcc492b02 (encrypted)