# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
461b9d10756fb051a457aae21496bf0adff3dcd821ef1128999c7812abe04435
Pseudo Output
7252474f3422123cdd5cd4ce88196fd9277ce043411ada13e681d0dcbd1a4e63
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2656303b450d319071953268d55b95d1577fef671d8539193d6f6a18978dc5d
Commitment
acc1fcfc45d0ea01aac68597489e1c72fd4509eaa227afe6fe54e96c4ad9f003
Range Proof
672 bytes (Bulletproof)
Memo
bc34c8c08c6bb42051865375885d2f2e4625c65c9a8c69ee0b0b391306b057944cb7d8501230030cdc5a15882a84ab3ad99bcc05b1fbc80871463b31d7c9f93df522056bfce810315c6019239ad6fdbdb612b77d4f35c9ad44542289ebfb60b16ae202f6d2d85e3c9ae5fc476917c05759fba329c1aa313aabe27a15d5066d86 (encrypted)
Stealth Address
30b376e4adf95f5e856d98e761661cfa42a99538299fb447c84ec60099c98a29
Commitment
fa7d7539099da0a39c865eaa140f5933c94a4228c61420b1aa1f92c9bf65f918
Range Proof
672 bytes (Bulletproof)
Memo
516ce1b54560204777246b7122c69d74a290bce05a78e4e5dbed9867069d65c346d5d9fe6f09761c46ce700afb0e973ab2c8365cc05d9fbec80d43da80ceba313248640689056323c6cc9d83ceda0d717882b1c81e7adb1e877b54c347280adb83c47f3d7590858c80c19c00d235dee45f7342814573cdf64e0c2fb5c619f8b3 (encrypted)
Stealth Address
0ce2cdd471c8ad2ec47230eb5fc4b4e8d642817fa7a6d8f907594c33d8064846
Commitment
02bc983dad7016dfc1e2e7a049bad73cfa5809b71080e28d9f242b09c389727c
Range Proof
672 bytes (Bulletproof)
Memo
f8fbcd2db5ed84bcf6c00eae1667bcafeaf44f2ada925fa7d3bda6f5ab4efc4e577e941c1ed99457337fd5011a048a75bb7a22bf14d7447fa24bc663468092f1ff0113496afad3f869e9af5279f61d43422f4678085fb8b28a98fae8757b0f1ffbdadf08bee7cf0fdddb3e291588cd1723db145b29f4fe2703d01232dc782268 (encrypted)