# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0efce0182006acc803b1054eb380695444bb94f0aed9b42268a76fbd1e50590b
Pseudo Output
684aa74dbdb3058239af164ec6b93db2b059f8ba409dc49b7d8530e21f5e965e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
104893680c0950d0216a0a5e978d3a4a5c9c57b9da282d0e170fb70077372f30
Commitment
70df9ed054ebee3e2964387056876bb5667c6f6ff01793d4ecae24dc3c51191b
Range Proof
672 bytes (Bulletproof)
Memo
eeb33b3370bd619f86d1bd5e26f20bcc6afe76b53b6ce7db88d1e8aeda986666f7035bc4e1a6b4c56cd788afc06215ff865285310f6dc5745797f2a42eaee3ec70af0ed236d73bfe4ef6a5d20b346e52d2298afd12398573a2a8ad001db496bded65136ecdaaee0fe211208750f3bc0b70ef6b4a58e8ae7689381e6108f0dd90 (encrypted)
Stealth Address
de6366cc27d3b07a00c30ca05167011408bf06ef91086ce155b07a2d8eff8944
Commitment
36b3c85e2bca4a2e470a2914f1b14e5dc375653636e98fabc1df58c80365dd2e
Range Proof
672 bytes (Bulletproof)
Memo
200c3d2926804ac780e03e76af6a41ea52ec71b29315228089d2e984e22117c74003afb0d4d7449d64825c8f969d1e8d37a910c6264fb1ede0ee1c6cc00ee5921f9594da544f82f45c4f918f3b6103131ba6a56cfef2d14a601efe54a7f2f682b0d488e7d98355e257797c1c1f4bef4990923018e9f248301b2bd627b16f0e8e (encrypted)
Stealth Address
24d3ebcb0cd3448b640f415c3458d626469e7911779d31d9aa3ca65a3cb73d30
Commitment
aaf5da2633f1e2def333069a698014a684554a13fdb9a47adf90643f128ed07b
Range Proof
672 bytes (Bulletproof)
Memo
88fa71d763a70e33c850c8142500e9657f47665c499456ca4af153d59b833f6772a70a411ee4c3609e5072232701e9a44547aed7129cfeb14c747f470b5080e9c364a26714d948485f7a7c764c5fe639a43997b84d551dc8f6c38a5c1ae92f01846be10b96b1cd669f9db8b7ec86726118ab1651f5949dfc1880d69676aa9813 (encrypted)