# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b04b3b85b71d4791c0ca2908383bc9c814948e444506ba7ac66f375777b71f31
Pseudo Output
1a7b7cd2db174baac96ea64bb5dde3c744c22857699dccd85b19a386fba0d14a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68f95319494999dc15964b7a56a2110b80ba9361fecda33649c5bf18d825e110
Commitment
36106c28863141e00cf5c122ebe8ad479990dbd915a12a8a2c2c03fad10fed33
Range Proof
672 bytes (Bulletproof)
Memo
66858100d9e35b846711c224aff7ded80000a4f8e0c3cb4f04e5e90ef6cf1992f11b25707649ebd4db2cc1cfcf1163fef5f270aa51d87e9b1292466af2343fdcb7ae15ba16ef38d41ea2bb02b941c9cd8a0f0d315f1b97b1e9e08c451f71c84ccd2f01007fcc31dc4c41e89af7971c254e068bba1b29489a72e2aabf31a18949 (encrypted)
Stealth Address
12caaf0152b1d65ba6d41a8a7cfec43475b504e89087f85f434d60f2d951b65c
Commitment
fac5fa95e36b3ee3c208a2481c65d676d558f74043363469abf9a7776664f17c
Range Proof
672 bytes (Bulletproof)
Memo
eb5bead9e4d421e27d00da3b3b712bc185ab9346252138363d8c6b355f88cdc7b33c7a44f78c37a26aa8c9c3ce3e8be18fb7aa91056722c11eca88c352871cbfce7c6ab01533a580f4920bb3d457522b0fe1e0dcd863c17cb94761ba83f6c9af7dab2532fafbd88764cd1a8ce9c1471a186d24fef7f00453a580b2bb2c9866da (encrypted)
Stealth Address
507ffe71efcc2d24cd9db0b87272f7bbfa1e75d4948601d26adb57e3ba07372f
Commitment
540c6cdc4779615beb5c601491b8296d9c9fc188a651371b29ad2882dc8f5004
Range Proof
672 bytes (Bulletproof)
Memo
c10a539b8e4dcb779dc11d1db9755025ccaf8d68463fce33754258c58952ca1b9b641685e073ce0d028bbe7e700eadc12458d0d01a90ad1d4ee3cc1905fca7c481c6e9e99bd6f373de88b894e64af3236bfe2e8ac0c99e9bcb2df2d568128f35c6a2091905bf73a0e34c4c7ac8cf723dcf72c0d0565372c8177781ca23eb230c (encrypted)