# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ce8991d6a0906d647a0c98caaab1d0865cb2acbbc289db7e574b6a93612d7c67
Pseudo Output
401ef5d94b9d4e1d52aa6691bc0991411e0d0b7c780c07e00f2fa82abda5004b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68f0994468759becfffed924989967a588263b2992e1f2a9425667247fea891a
Commitment
2668991b9e84a8d661a1e96ce82d700dd036a2f3f526c298c4e65a1d0d2e3551
Range Proof
672 bytes (Bulletproof)
Memo
3b009bc08a5220f7e2a7c3886faa061f7d0217f99681c3aba387a6c1f094aef46e64628724ccf4d2abec6a90f4518680ecbf8b599df6b88f33a9ebc88e12f5d221c6d1df0b6c144ac63f1765276b2c55220d4d539e6eb1ef6774696f45834042f61bfd745d15752b647261ff4debbf8b26b5cf71cebbf164b82c44fc30cb2a9f (encrypted)
Stealth Address
d4637250e618b1e472c15e6488104a25b4d9c9f34e41d4ee3becea8871f27807
Commitment
80769d9bae79b51ecc3639900bd9091208e704b30f6e116a95b3dd59cd8b6338
Range Proof
672 bytes (Bulletproof)
Memo
4f1ea431859c68c07190dbb753728a44c4be73940bfad3d4d271c849d2b339a58009cf530f25172e07bf85311118e9304a46b8988736f03a58dc0fcbb595e89441f2f7e8972e55ca6b7094c0eb5fc869cec64c45ff3c2b870cde3720738430ef84310d2cc2bad2a91a1bd2b9dcacad2c4bd194c95cc453e16011147e136873bd (encrypted)
Stealth Address
bc0d7bf44e7eefcd500a65b79f8c9d2f2eb90ced8f1551ccd95f0a4d21e92626
Commitment
ba54715aa251aedbfd207ebe06da2511a143b9a7bb16a09781413233b66c8f3f
Range Proof
672 bytes (Bulletproof)
Memo
8ea9aa48f6fc4545d481c221e5c38698a63448f0b5996ea6fa6a10e80526aaa970b1e286c09e7df2232048cd15a59698588a5ff09ac7ac687f1ff9ae64f8debcc019fb4bd949739366ca6c83ab0df7af80469e61299760f8789b8eff9d4f4e0f2f3d487daa8d7a761158f699236c9d66a16d2479cceeecb8d2ec5b37a66fc58a (encrypted)