# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b67793b76d91011d4b5607a38759978f7ecc015bd4048d3629fb428335cfd578
Pseudo Output
fc7792b2af5318c650dca6c391da57aeecac50249fad8519730bf9215996c749
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
728928f6ca704c90e3a9b1d879be4320c4c84a2652d7440bd755d29306733272
Commitment
6aac8cc5b5daa1ef80e4d6d8303e15b5bb46ea330c3b31877470506a43b7cf52
Range Proof
672 bytes (Bulletproof)
Memo
825d9f64a99ef1b700c0b1d6b1fb21aa18658e37341761dc12373cf96b5c253ddfe16221c45022dfb733ab78e22552647b3f3d60041185f1d9acdb5fdba2529d679f54325b706fcdcbc07ae13e03c2f8d2757d4470b4ecc5cc604ede4b4086ab460d1f6ffbd6724703fef7ac1891fe53bb3a699ec6ffd7a66efc5a13169f2e09 (encrypted)
Stealth Address
8a4bcce31d8c23ba704a3b63d0681ee555e09f078d496c27b79714df853da862
Commitment
fe86f8585dcaf475dce64bf65a30211f1444521ff3afd0aec0d9947c77cd6633
Range Proof
672 bytes (Bulletproof)
Memo
809a34cb6dd4e98bb4ad755bbd8c06cb04209ec8db224d6617da6083b7c2d8bf75b033bcca1f9260c6a6667b31a69cb35ac4b091ee4ba221a01e98c6de7cf1bbf3284acdeb38d2d5128f694277c2fcce0a953a5b33fea9a0ebb1d0f0748a5ee65aff3f079eefcbd96fe488cee90c16d5c0de8f6a8caef3ebde8e4887914eabd5 (encrypted)
Stealth Address
969f955cc8d3a00fe96fd4433f7beced1a02fa390007c6eb8409ae7c0425a364
Commitment
00d8bb36b5f49830cc35f1d06ba4fa7563457a8c8c2615ed03b5b851112ce530
Range Proof
672 bytes (Bulletproof)
Memo
c14d6bb14fd453d5b05715e4e3091fe04642763dc9305b9623cef4cf11e744cccadaf68debb829f1bf2870b8ac2b74d384e39b33abba9f4122745486de5a540a6a537c47e25415a0e1a5c7db520928145e1d3bca803c69b3c8f9b569d5bf18107b22e6db18d77b3365c50e5d15ca1ca4f2aa1a71be879b2b4f74a268da1c24c2 (encrypted)