# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
788b8e4749557a7497d6514a225628e85d939c183053fea9484b4fc321ea754b
Pseudo Output
64a91f6581863283764ee2121e96c773b412cc60337e1f818fa81c2e4971e20b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6ee7c052b693e9b56cb565db7af4e41e62002f7b2c49097ccfa59c4fe30d0463
Commitment
f2fc320d7215b1f2a602ce930226f09473cbe2abb5739262563e1d49e0efa608
Range Proof
672 bytes (Bulletproof)
Memo
1614327612e9cc8e824c6865553aa0df1102430761ca81e136e4c25c4803ccbd79731be5e5cc81abc09f1e39c1b43e007c6e2f17d32ea9c5ad1eec152bc455fc779f67ff7e7d492cab471adcf735046726923754b5af410ccb9d1f569e59d13964aeedc58e04e52d6328b60b4d12607eb8840ecb7edc2d67156e38d5fb435768 (encrypted)
Stealth Address
063fa08a063eba2d510c866b88a39ab0d828276a79294b766e5f8abfe5392b62
Commitment
f85035d6d3d6adc996264b525ad3f4bb499ba31f80bd40c3b73c01a72e041b2b
Range Proof
672 bytes (Bulletproof)
Memo
722e1b5bcf579c04a4e6cbbb7afffbe896bb9863012b0c3c6c3035042f9c876924a93b9e2774585fe11368fc791497a121225edbd637f324920a769484f79820d3447b52f12bc5a953788a9b2c377fc7b41a81ce74e911f05d3f488d345df53380b2202e5d65c4d97696cac76dffa846cb7fb9b7c1719bc8f126a397f0558f9e (encrypted)
Stealth Address
aaf247b7283f75a78c8e70b2ab1b7c7bc3c70409f1c5d4adc6f4ca2d4b792911
Commitment
54e86ce28c468d6a14d116f2f96dc414734b4a7225ad81a1b2ef8a812106a40d
Range Proof
672 bytes (Bulletproof)
Memo
3dc0d8320a354a6d36bba90364fd35e4903d9ed919fdd317eaf99239217185c574a1315307cec086ef5da7ff09f50c1ff727f7b9622d20b2c73e7d8eba2c90e8ca2415ea88313c4c6d12116b75f6278566e95307356aea1c592ddfc3fd3b14aa28d37cc6f794ac25a32ca4dd4cfd5daf4bea806f8135a64f9e6fa4de3e7d27c5 (encrypted)