# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6e76dc808acec75bc9bcb5f0bc1f95f92beea201b9cf4e828980493b2ecd0655
Pseudo Output
74efb9cd354f9867a1f8b6d52a030c451f098ea57e77ebfc3cf35b6a331a8b0f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b4aa0d48b7ba6ccd3b4917dee3746a3b167afa0fab35e3469ac8dab5344d9b7f
Commitment
def6f8582e1d6d7502d3db050e5d2535594de9aff0c873f7a64e8e892f49326a
Range Proof
672 bytes (Bulletproof)
Memo
c398a32ed34effbf8d476b7a9bbfc12659bc501f3f3cfeb6f30b703711bcbf94144a530afbc520cda67689c67c18b78ad164d7a13e7d6798e6e0270b929f1b640b85369a7cb46e63e96c5806e972d26b8779824e70d5360397721c5ded1156cf04f7a5cac250c732ffc7278398a3f368ae8fffb0a62b871924a76101c480c339 (encrypted)
Stealth Address
2674367c1873f22c75118b88d115f91aa1555645458d45cc9a46c19f77296116
Commitment
403e4b06799573c32c60cfc9635fdb81190232e5a5b50ab7901920f7853fb50e
Range Proof
672 bytes (Bulletproof)
Memo
6ee11ae0e897f3971a08db547bca8282a106436dabebeb04f9ab35d24ce3b042e4b7f7ff34405d691a752a64075e77c27b2552cc6f7d16fc38b46133bf2a058c0d1c5ec458350b87b97983a0ce392ef70e858d766a71ea05058f1100375bbdce5a87299a7ee9da3aff58f49c41a3221d444603cbaed71f59e6c079935fdabcce (encrypted)
Stealth Address
28b0dc5cbfba1733786eb185d3b93fd28d6ba3c8b58923e28969eb19b1727c74
Commitment
0433e8583e07f9091f4dda3c523cd28057f5407899b33a6226349aeaf2b6655c
Range Proof
672 bytes (Bulletproof)
Memo
a198fe0c89be4dd8f1ee0d0af201a951050f1db1e81158a9f55a520ad0c39f433a00d1dcc7667c494930c371d5692d6e012fbe2df47566088612678cfc5828d084e7538c6decf7f0c6ca7741421051d060efc0de14e1bc7e48dfb710f1cc809358f70e91992c8cbc77ee2462f2abd32d7693e76e3aa9fac88988aaba93f4c821 (encrypted)