# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20ed3d40bd6688a7b69f46d96b63d24b2dfe406c2dedcf9a6c9c29c75b6c7a17
Pseudo Output
265a3faff3ca0cde5953eec0988bf716702fcd4d0a64ae5778afcf849505234e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c99a2c6341d8762ee794ee9d4ae459be5431468221fded6956fff486f112c3e
Commitment
32e89109b16a6243009a4558d52f3898cae7c3943d17cb483ba680cb30db942b
Range Proof
672 bytes (Bulletproof)
Memo
e89e39ce39e9e2874a492fe6578908ecd145bbbd1a0d4ab042d8cd5638893ab69479285fbf5a72901e0831c8ad685865c7d59bde21b4e3ad25f53891abd2c49c9c72f11b499605efa20c414ccf2dbcf0b749ef097874c1583f63ab683847d50ba6f4d20e693a8ac041410ee467afcb8e53e0cd8b3a2cac25e291dfc5b28cc8fa (encrypted)
Stealth Address
4e7dfee748551876baaaec42e0e5b7b9b284642407ace082d4f54ba2cd28f217
Commitment
ec47668fc3343f5dc0201728ece5016e021561d3d6fa14f190e3dace3b0b656c
Range Proof
672 bytes (Bulletproof)
Memo
b19f60e93c5b98508de900c2ce32674ca22e24821440dc1dd22df019a409592865b981eb2ffac43dc7227e0890893b983684108e3cc85b465f5a3a1c76a4d28edbc25e13245dc03174f6aabdd929927cd60999e9e313c0abc79535567e125f2340727b9894f0e9d887be25005426109b9ada48c4e167f65aa3be292311bb2864 (encrypted)
Stealth Address
20c599c207bd880455ddd650e6441deb2f1cd70e03b8e8afd8a9e2a36da52331
Commitment
a658f72b99499ef45bd8a9f9019798a67cd102c582ffcbf4a4f4e054c3631336
Range Proof
672 bytes (Bulletproof)
Memo
4dd139a4e58caa9446c9f8f11da5f5df498752b135b1a630f0eefebd1a85aa3073636a2b339b6dcf65fdf8ffb9c3e3b7492dddf026d4b566f7dbee6283996eb2002b44736cc97a394f8fdfc9afe31c0b43747fbacf9f9bf56a43d91f605214d7d92d7c2f06278df9b6865b9b0e99dbca28f34bf6ed3b0299e0c0ccccb8cfaa9f (encrypted)