# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8ec92d049ab486fa518e985c7736c763c0133ff9e40adf3b2a7189041bd20624
Pseudo Output
168a936bba2af5927006c386fd00115681f1c34417108816e3447313bc3f5c05
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4ae20d7066b2f3b9feb5a9a9a20632093c354538a2106ddbc0f170b5461a9b3a
Commitment
d88275afa031a86d52613055ad168417e2df724203e93d8a8ed8e327d0230904
Range Proof
672 bytes (Bulletproof)
Memo
d4db25dad793139da7eed4820185f148e7151581e77b73f26960f6e1141940b49081e0bf51d63a8ab6cd3bca02b6b40543620a0e6271945da013dd7c173b7aa70f9fb83ce9befe667a5d6ecf36a37475fc2830b88029b78accc0fc47acc7dfa39749d9df686eb704a64a5e3d96f28f88f7f004a7b2500d26cb10935d5f8f7d20 (encrypted)
Stealth Address
68d3c18b7996af132f06720debb5be2d44376f95a1a0718b29f36e7822c94918
Commitment
f6478b0030b23a787bbeda82a9f6722a92f74739a4e01d55105049387ce83c25
Range Proof
672 bytes (Bulletproof)
Memo
b49e4f72767a67e1124799b33c7a35add2e14e051021ccc7441356d5a0955e4c8643c470eaa16852b8dc9017631cf469f50d3ace466602c155f0ab4b6eabe9721e45f0d8bfa25c0c12b158ddc7ad9b48b954a9a9365def8fe184ab831c4a76e8e631867fc342ea63261e824e98fa536bd99d4bdf67f1b05b701c9fc2781f6a34 (encrypted)
Stealth Address
964d1cd9909682c75064332d868420deb399f162c47ba53114b5122edbc72621
Commitment
489a56aa6e09aa6ed78d7603e671253241f13ae9ca7e332a9b76680365ca787b
Range Proof
672 bytes (Bulletproof)
Memo
d19408267e3d1d77f32ad726b60caf903029c4d0186ece00c9f5a9e8f296f4fb1b87ed31e77167f795eae54be4c2e06f5585a367d165f16226615d4276e8cd72f1fff767ff272a19959dca42bfedc6f26943494a6529ba867c45aa1cda6512ae90fb33272502590a85bf0884672d8c90b1b8d7ae629ab72b2107c2421251ee6d (encrypted)