# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
146ab947cb69ed2219ebb92eca948aafaa7c4552232124173218d3b1836e1151
Pseudo Output
34ca7d29c015e9dfe1f9b7456899fbfd7e747c1316531d432933f81aaa27e560
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
72cddf1b997db7c25b1ac13cd366d09985a5c47051ac5a9f7c2fca5c9811da12
Commitment
9ae107120ead0f3c9c77f347c6646f9cacc9f48aaf83f4127d68dec640ef910c
Range Proof
672 bytes (Bulletproof)
Memo
03144c5f3b4ba1e403d79959affa4e0d1b34791b9bd30a2d0bcfcab47e62dd9cb8158570bc14450fa03d27a6b6a83163cfc089a164b1140b59711012ea9edcf822c842fe8edad3e736738770096f525ad236f71e2138d111c82b5c62916338cd3063f8f304d6bdfd9a6afebb448647dce568650c0f1885ec053b8163c4b25d31 (encrypted)
Stealth Address
884544eadc6d0cd1e59d57114cf16369f6acbe0c20ae96b1f2b602c4450a3a0a
Commitment
e2b6c2c473ddadb0821a6164ab7fac713cb802f605e52958dd64596e7d60f043
Range Proof
672 bytes (Bulletproof)
Memo
68a320233a1931e2496e0bee86652ff98020ca849ab221b7cf39c6589f9e24f7108793dd3bbd34a803287b6430fc930431610c01e3cc44c6d5d258b299b0f85e5c9864f27f2b1b9f63997db25834ac3621234df2ae1ccbf93c9c151001a8f3fa1f6231ce13fe438b02fc724e6c0e2575358f8b9af895fef7f21d49f774bbdfe3 (encrypted)
Stealth Address
7631980fc1bd495d6e7ec60a6ac9e9546ce5fbcb7383bf8a1225eca72dcbf411
Commitment
acf7defbbce015a4c0813a7e1dea487b2a5d3d90bab5fd02fe90551da57e954a
Range Proof
672 bytes (Bulletproof)
Memo
0b77beaa01a257864bb363210af3bf6d013b3251ed2721eeb370557cedcfc4cf58cb9cfbe428e81fde68b89a74f64c1f475d8dfd46404ea0dce63ad3b153120c497b9aba71135ee4fc37f0bb87aed5b22b921d48c570183f61f3fd2b90a699c64a3ab61839f3ad05ae291005d022cf297e59e24d67912961fbad3fc282f8a08f (encrypted)