# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e6970e2860f8cfcae67683f66fb83c8ba1112053544b3f20c6cdbb1ae6c5bd25
Pseudo Output
827dbbd33c4edd9337578002b3f05134872e062580903d8a3689c44632678269
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7cf6e90b0684607133e7ca2221f2d7860b3c8842294145ad8437fbe57a766904
Commitment
e4329cda6742124626e042f5ba18c6063f481813de7da88c4007ced7474e9f25
Range Proof
672 bytes (Bulletproof)
Memo
6db8fd9618a3bf30c5be64de443ddfe18eef7bd588cf98575aacb0b92e686109404f960120a1a848ae672309402b04900d82933cf2dead886609755d51c2dc8049ba91210281bcedd1f32c456d04ed8b6fd67a836a45ea485eae050eaca174cdf0fdc9711c00fc71a0ad95741e5bf454463afd7ac9864aadc8dfba822dde36f6 (encrypted)
Stealth Address
4616ab4e136115a227511d5bc7aa9fef3d2953297f528bce92afdb64aac9a057
Commitment
66ed550989f0b5b22d202657374ec689349a045aea500a9a7ca863be40f05f42
Range Proof
672 bytes (Bulletproof)
Memo
3da712cbdab549a2b308fbf05e05a690ad852b38fa1d54069c03ce616a5a450907abae499c7a1e2de0bb2ebe9a82b3f3e572d7bd5e079bd844f1ae93ff6154b725c0f647cc0d48e28212bc47d665930552841746232a2b86f73c0290d210d13e7494336cad57d7c444e072422a7955bf91e07399e4779ac7f27d459b1a365868 (encrypted)
Stealth Address
86e87131acf9c66fbbdf60d1fc571a88f9d3bb5eaae864f73c8dd1d53c85eb28
Commitment
b652b741bae704e3a60376d03d205de672ccd56ea6be076b6ed2c24ae8d83658
Range Proof
672 bytes (Bulletproof)
Memo
4faec4a86ce45be4bc2745813c3b2aefbce6704dc263b9c960b6eb6e99dc549aaeefb3bd2f64dc573e7711368303499e8a7db66f74f529a21f10d480c49ebadb8cef747776ba5f6858265e07a126288f569fb7c3d00ba8c72395ec93930439bd7dbe761f41c74c1d9e48d7466d304cbc6a17c9908d25859d7c6624289f27010c (encrypted)