# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3cb783598df8726eb9ebe422b5f84740439607a8d7cbd78cd241f11e60a10377
Pseudo Output
9402c08fffca5194336a5a07bba688080624b8acf47af7a6f0c7752a781cf657
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6851ecbe469bc3d39f966cc56726e02197f359a7fbeced8106d1fdcd89853e5e
Commitment
ee4e004ef6e5cd2bad2f288c8084103fcdfdaa3befb2feae8aa688e45f0bdd16
Range Proof
672 bytes (Bulletproof)
Memo
6439c2999a3dd7b77ac6b31b936b7ca33f07b72a4f966d77762659d55a8f33e8ccff9606a9f141b77c95dd3120dfd06b2e7ca35a25b9d978cdf9f338bd83c67a82a9d666fa9a7b7683578adce1926fd82077aeea77f740dd169c1aca6d0df02328ec16305b7494fe400b5682e6939f561df816a0e01e46289b65e93c23b211b4 (encrypted)
Stealth Address
6609082c55ab24206a010412a903d822d69d51b61b484bfbb766f53b8292d93c
Commitment
da897ff96bdd8885da4f51342d300bf7d159ea45477e82e6d81d23add526bb4a
Range Proof
672 bytes (Bulletproof)
Memo
7c212aa47704c2d2b908358031b3333737746ff56839561dd08460dceb9b5f960ae57d6ce2996a0537d2e9dfd26935b1512518f1b738d5064760b3d12dd75413873092d14892d9b49f9133052c196d911ac6fa45fe66f3090e99716f7dc9e9023c0efba159977a74a6662c87991fcb7bc2b40f4c3799446742a15c7d29cb97e1 (encrypted)
Stealth Address
c497c7206e672cf777e3fafe3620042d84100d59cedc9a61afbb9de4c674aa1a
Commitment
44911fec1be368fcd3ee94f0124515ad5bf971857f25345614a58744d881d12e
Range Proof
672 bytes (Bulletproof)
Memo
f19320a7dbb301ef3a6a255cb693133fc50105912eec22b3d8df06871a578eb80c34fda623acd966eee5770230a591a106fb66231e621895c690acd36a9f0eba8ee3252c807ea45c2ec7347ce36b8c9edc7049757cd5d1d0308d0f9aee62192d216e2a297f383d23a55d686faba865c9053bff3993e5e6dfb68907870114dc82 (encrypted)