# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c203c7186871fdb49206327e10c417e053987f407bb42a1f0dcc153cca63492b
Pseudo Output
60ceb90cad10d2bba1ec3bd16f524c6def4333429377347799abe0e16264cb17
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96bc46a3f0605bfc20fd2e2918d4632760be6358216e94d72168cf414c44d526
Commitment
762e849828543c95d9f1f01ad6ce311da7b55aa62ba02226707e3f6c19ecba17
Range Proof
672 bytes (Bulletproof)
Memo
b262855d988c856e49218d0522a0ab286479d19595ceb43c1032509434fedf11054618994ce2872c15d7ecff21c67d5335ac0b5c4a6aa7fb36a6292a2dfec34cc83347050139ccfe0f6c944738d451ca100dfedbf2127d8272ad664802cd93328a7aa1c02f3fbc49b919ad1aa6baa63502bdeff7b47fd5638d1c2da2c433078e (encrypted)
Stealth Address
12eb3fc4433ed3d216b75acbb13d2917d12c95bee1fedf978ab8782f27c4e542
Commitment
6ed01d5c5b4bae15be7f9c236f3c83b3bc12346baffdeb47dec3874ca011aa58
Range Proof
672 bytes (Bulletproof)
Memo
3c2058265c444f573c4cf04424abf5b454aead1c202e50175428df684c7f118af33ac900df6d108bf648b5f0da4f4791d5682dce9716b450fbb486c0d68920159c709924267216da4b23bc5b89834054614f0f7c3e823415e7feda63f1848d164095cb2c00127dbec22ca7673e4a173f4edfe3693c82c12ff6c3fb5498837d2d (encrypted)
Stealth Address
92daabdeca1361129cc09919d59986de038e06b65403d96e423365ad95ca234a
Commitment
9051bd86e665648be3d2cab1936d10b155ae76ceb3e41a2fcd6b332554e97053
Range Proof
672 bytes (Bulletproof)
Memo
834d50e6b44620ee32ecf274bc58648cd6e07b90e4c7c5797e3f81f2a6ce9a18618e6d56a1229f7fa5a4498fd317e49cb7085d11c6437b91c71b36148ce78e5e615f74bb82a435280aaa4e67c912208cf5775e08bb9c5a182c271a86d3fd3ba0d86d30598e174c933305720065f6dbf99b817819fa5fd7060482f19b94cc5a8d (encrypted)