# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
60583ddb57febb477120672ec53f6975aa118aa8cd715bffb5090aa954bff910
Pseudo Output
9075882842925c17cb59aed467aa7a50399af5e01739dc8671770aa9c238932c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9cba9b562c0f7350cab6c9347426b7746881ea8792b5a65752dfd8c28ad31f51
Commitment
d618db4d37eed474d94c7498460b17d8cd2613c71ff9d4f4af07532dc1b3af3f
Range Proof
672 bytes (Bulletproof)
Memo
72c8d0eac423c464134ae3bdc8de7995dddf2f69ab2c033a91f9459fa40840bfc818c4e445599a119cf7a3a327fa281f8f9042842a732ca57268a16f6897d08f3e3bd897914ec985e88662982da30d286e3a49961e39a1d21c48e3e49c28ec86d262c59af11e65a37532ca1b13ccfc5375012429aca13165872c54e0f68abca9 (encrypted)
Stealth Address
8a2b4c1fc4d59dddf0c3015f270f2d05ad15527a429f32fa9decb0f58ed7401f
Commitment
fc1c24f82fb0bfca2891bb5e4234444055004bc156463c0f21544b7a621a0f10
Range Proof
672 bytes (Bulletproof)
Memo
1b6ab252f462f1aae4f7e5c37ae0010443f2bf261068131899ac5f76660796cc3351d75044236969f6f3eb9a306a5c8f7fae07d37af2a49e82fd048f96217f600a6bd3fa52d11a0e95afa12a31e799192df975f20acead986ae68d2023d56cb43e27d9635ade3a7c2d8d3afcb7b0b6117e092d54756391fbe61c27cd2e829c25 (encrypted)
Stealth Address
621f1653b6fa8a14dcff0db690efac288ba8bf62d0751a7dab703ba8c536727d
Commitment
181580dd32cb9f0e263d83e7f2891106a6727f0c022a010c0df4d0de7600a470
Range Proof
672 bytes (Bulletproof)
Memo
a307c9c9fac0e22921ece522fa65f13b5637a7dc6ebd2d3ad03e50ce07f4e0c91c0ff613422743bbbbfdb9e99f58d5b4a2d516ffe6286efa217292d441eacaa7d23af381176c56a9db19c9593f1c09fbcb58fbeeef5cff4348a9e9b4b95e3e6f0419ab643c784f15dff17b29daa8f6c46929efece1fb934de91e4d04467afdc9 (encrypted)