# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b446a721e54914fcf5f75004329628a9564270d5e5d4ba00c6d584afb3788339
Pseudo Output
4e30051a77cdb5f584b837c83309b61ecf6abe66a21a943bcf6f92a55088bb6c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6cdd4c8e4cb654450d8a968cbeaf9da50c05aa96c841fc508d519bd59b6f9975
Commitment
9623d89bc9a3243fd5961bf6be678b7144686c26ea3f073ed76a6ea68cdfec06
Range Proof
672 bytes (Bulletproof)
Memo
5c75483c2a086c03a1d4d19af16d64fb1d49aae28254c5b391abfde2332457572be0e57cc9f518259cb6ef0840fb8ecc0d2dfe3b505feb224a908f6a5abdb9e2a1d0b340e8f05e6cbe3834d65d1ed19283fb003bca55e7f6e8f4c7c9729f48e0d2c5d2c12bbeac4cb7e5d87b310426749b9a969f756e770134b18b5ee7cbcdf3 (encrypted)
Stealth Address
7848dff0386d66ac716d732756f86f2afe87f702726e08c0d437f68d3e497632
Commitment
88bd2edb7913789aa117216c4e34a3d69884a6f439fe5705287e494d472c524e
Range Proof
672 bytes (Bulletproof)
Memo
72269f2eb1bb7fb87e6aa52aba1fa89bf71962d13d16f9ab9665c4fbc70a855657a2255140d9efb37ef94bea03d96446609763de4968f3b0245cae0e01c575ea71a393b4081b5446e07e1986eb87c4734e366949c62ddd55d643351f184f44e0ee057677f2c7ab714e3fe29e81f7e65b456763b1693098b01c54b6504b00fce6 (encrypted)
Stealth Address
ce68191d610f5d8d9ec0e17f9bce284e1a1a7c898c4ae3dca6c78cf0f5e46d74
Commitment
04375f25cb34fb3194f76b9583f9336dcdffa48bee9a3c9dff350fb469cd4c73
Range Proof
672 bytes (Bulletproof)
Memo
104aab8273cf8c941b4c981326f30df9f1ce3a7d98b473762780561d7b79210aae41dfd440a6b813e928628cbe0c80c85370763f6c3e8ebeece08e3e3a8d153e9e03443bf9cb5813bfa5aa46c8eea1bcecc05bb3936215e6ab81bdc1f7997af03efe1c8d0b05e76888c182833f9800337e7cceaed3cc77e134989abe98cec011 (encrypted)