# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
62e1b3fd4f548e790b4e589c46af6f7217df474b85877891d472f018a0d01838
Pseudo Output
e4aeb8dda0765e4d2a46b3f86d1579ab125064e0c009c12dd4f1081203977c4e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7cabb294a4da398e35862e0bbb3d6ec0843a2eb3a2a042f90abd4462232c7668
Commitment
c6e723e09b574c6dde3835483bd0f590b065836ffff045e9fb4c900514e83804
Range Proof
672 bytes (Bulletproof)
Memo
ef246492881369370a7b0fda4acc153df948102b69d76906bff324210ad7ba562df2d711aac3233604deda84b9c4caf9cb7de3f68004a8cd116df4b08892543be58c5f8907c9d52972450ce05614e5b4eee03102ea32d6a4a89601e22be0aef81ed04fc3d9e6b84473a3e6162d149526e29912ce1420c0fdb3950bb40c20f8ab (encrypted)
Stealth Address
b002238c481ac2e97bdbf5b79d24e7443ea1ce40766cd97f5b62e614ae7ee137
Commitment
c862772d0844207e5ceb3bafa8aa34fea5986e683302d35db55fb7afcd3f7038
Range Proof
672 bytes (Bulletproof)
Memo
a3c1461f9f6bbcb0a488a2c13eeaf4c3d1ca021815e9a86afe989df5b2ad2c2fdb20e202a4e9011757d197a50c0a51dfc0635470f0d77d08167c514baf323684de6bfce756f548d7055dd468ac4be6d5cbfe0bc390e8bcb11abd477fcd5ccd839cdcdad96d61101f4cf6aa1cf25679a249b5d5d92e747e1cdf1e3c935ab1d0cd (encrypted)
Stealth Address
be60068784c24610de360f315c385e24431e3d5390910a5731325e4a0882fa26
Commitment
c4254c3ee9c42446b4f52e30e0e71d81af82e57405be2b4ba0c71c69c349d321
Range Proof
672 bytes (Bulletproof)
Memo
3ca7e2ed4b47629c10413ea8d22962cca30fc8c5c2ed137a4d56854af2883178ba3f0e0dc697cac31731536217067c53b9865b5a5566b518e341638f76384c6656f4c2312886da0998553a1654fe337f28c3e57fc76185da8915bc8accb9daafb10212f873706dbd903ed06e1c55be5f1397616bbc7faec79cc595610c168759 (encrypted)