# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
146a3d6201ce125600eaffdd3d6a03c66652b0306196bf713126f0c63b25bc03
Pseudo Output
b2aea75ab1e325f64a26541e0f7463ff4ec775841751e407d80daef047213e67
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6007ca1f58fa451998729c5dbdb82f0c105b895902c4f1c293c6528c3e95672e
Commitment
34f403ac11ac3e7df991ca2fece3ced6eec8aff6c9f5af0b27874038d023ee25
Range Proof
672 bytes (Bulletproof)
Memo
b7c712769ccf706b3c994531548befa51f1e1c0bf5d10bf34a14d0ecc07afaec77823f16d9cfa6a7d957bf490cf5e27f952a470ba250b4263b79a8880463dd86b7ab69ef0bb6d23df68ab72698f0342eac28463c6c880913180d262a9be7cb3277c26c0359911eebf497d76948bc6dcb1f24cc9715a119778fe6b2571d0f7446 (encrypted)
Stealth Address
cc150e49db3f916d33198a5f4defd4b04248cfe5af0e97d8d3e9e65a9305011b
Commitment
6c8634d19b7e156c046eb3c2d7243b5161a357a43ad8bd58d72f74d4d719db2c
Range Proof
672 bytes (Bulletproof)
Memo
4c0f5f6b81343734895b4caeef69d2f0590061cbc355b2f66f2ea7ecfda5023c2bdbe7bc6dd42324ff48bdbb115505aefbf1e19ec728c1a7596fc1480415ba133492db2e75a5113c1c090725ea0c32ea9183b1e74880acb4ea6f1487f40fefdd41548cad1ee5312141b68b34a12cc5603e6a4071d08d8d2b2788eed16529a72f (encrypted)
Stealth Address
788f8b20f7bd932b29d3df3152693f64f9634dc098d237a30adea6612c718356
Commitment
18cc585cab9e1065d6eabe54345a9f4d6da512aa4539f4c957c862dd37d9da67
Range Proof
672 bytes (Bulletproof)
Memo
8fb61594edfb6ffdde9fd6460287d82728e41d0c4dae461cef5a84c7643438086383c8d4999aae5ad77acccc4c325563a3e49ca5e145ac78e106a70bda63abe9441a0c91c29f9dd9c35c5d62d49ab73c1ecf594e89b5fea43262fdb9606ab71aa8301002a0708fc5eaa03eb6ec52ef0de43d556e170d3ca545027a4f18a170ce (encrypted)