# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72b8d2b1bf2f993fec329757d8c5f5488d2718cab6af5a2e0e161a726609a370
Pseudo Output
be3d0601db96f2d81f7c8b72c8c5cd9759a49dfba9f4a19493455739a2ce531f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82ddca24669e363651f75cf1aea71c462503afa0de5d66da5552a54f78718520
Commitment
6a88bbd069c31e75b783b5c1dd4b624c08955f8ae909f15576192e6f7a48ef3a
Range Proof
672 bytes (Bulletproof)
Memo
abd1f98dfd669b9d54e703dd73a7e774326f0f99df76ce04014e850bed2fd43e705fbc37ffb03084eacb88bb57c35068dde6fe1b2f2b5f759a21186093a423165dd3dfc35605eead6b9bef222f6a3ef1a21b179a51941415852ffd91ed6808884b79f99376c11983bb2bb176bc0c2e41ce52a83c80e74c6f5d13013b668c27e1 (encrypted)
Stealth Address
b2e4cd08b902286641716c1b12b6c0ce2ec029d5214a143723fb0ca7d5d3a911
Commitment
00dc63834000ac6f459c66f82db95f3ed4e5fc588e8f4984de1c8494cad11327
Range Proof
672 bytes (Bulletproof)
Memo
9e70a0cd829171184c0bae36b3ad109d90bf7dc4959269674244ddddc9315d6c7ba4d20f4e31fc4623e64bd69f441102181f42e487f2bccb18c0b3de9d68cfd2d898cbfe81640503f927b7928c4402fdfee4fb146f1723b41566c1ef8e43434531fa2701583c6247c833281db528dc17e4f1a0ceeb9d5a7ecfbf263c2b2faed8 (encrypted)
Stealth Address
cac1e10a0f76451d729df36895594a08decbae3e69cce290ce651702b2bd4e49
Commitment
78f64e2d8d28d028e6cfc0628a4676c6db7f4b314c999b50e8d126a752ad333b
Range Proof
672 bytes (Bulletproof)
Memo
57b05d230e6e0e0f1c6d05def7daa7539cb373467cfd10a0bd461148ea5d23b14a8d58e41839948b3674205f089f6119fbf4e11c302b4216ad8e92142c08a5863ac4af5be67cbcebfad271dc277281411a1fe3304a739eb556ce1ade7157a893ac00eecc651fb2d619047dcc5cec1f763c86a76489882a0baf5d106305202ea4 (encrypted)