# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3233051aa89f0dc9ff4914e35f073a222d76658a2abf1d0d70bdc781f30e9e56
Pseudo Output
0895a6b5c562480dfd8e15ee73446ea9b61e30a3f7ce58fa0ede2814371a746e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c5a44926264b31539e5cc09e7d76340079c8a6661867754998826ddc039a915
Commitment
3c9d0b21447d08f915b001a7ad75f03000dc4ac1b9738dc062758cd164484a5b
Range Proof
672 bytes (Bulletproof)
Memo
75c3040a54ffff72f00b2453ea0dae36eff28e29325e028490d16e278c4eee594f8413be2b32dd15510de64697b26800765ca875d07b0a54489c6d95d1bca5168d8360e041ebf955fb91836ef79a3b2786a8516b76562298221ab7399dbc4e4e41117ac9a0bdbd4668486b11c99f228ea1096266f41604f2c10b114ff9d9b9ca (encrypted)
Stealth Address
dc642b4577b8049705e93901f29be8c6f99388863b55cf217778bb1003d3e11c
Commitment
1ef0f8827a467c96648c834ca97cf86948e3c345b1c4bb38c8a411df98ee7f26
Range Proof
672 bytes (Bulletproof)
Memo
88e274fd08133250108cad9a2810e6fce5593d5e2f7f27a673a066578748c75878e605cc784f9c7fc44873b8923afc39b018cd3749700fc84524730131ea58328c8bd6dc9ea35eeff1ca2d791f426300433e817eb68cc6b4b7bad1423676908d3364dc638cfc21e767520200a18432cf98094d42b10f3c4baa85c4abd31fa6e9 (encrypted)
Stealth Address
e80cf95084bca3d6c6b178e636d99d971c1531fb6f758b6a138bd86e0985363a
Commitment
b2242f0807dc692c5facadb7d039f5fd8b2437d04db03b2f930ec4fe76f54145
Range Proof
672 bytes (Bulletproof)
Memo
96f113857b8142c9a5c7851fd1f8bee2758916f6b6d8db6bba59438ef12975f6b02ea505b8d24b3b280b11057c6e93cbba1862fb865718690e5484262ea89df233ca5a3ebf4cf516ddfd5bb01a40b2b61b54e52a00ec640e582f2da298ecfbbcb4308f4a823dc4b389fa13f5cfd12bf112ba3254db999b512d2036addbd92e1f (encrypted)