# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
568bb449241ffc3ce24db939b50914d434c51926e279e94fcef547a05f57ab64
Pseudo Output
c8aafdc9a42ac52c790306ace94beb06c33f7c71826da6219f610d13aee1d23a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
520f21e703d57e4750da9d3fee4418de3ef0d0ad9660792309af172bd1ad406d
Commitment
48000c3d60d0d2622115049d5c11afd6db599c17852e43ddc51dc3d73e0fc070
Range Proof
672 bytes (Bulletproof)
Memo
f3083025c5edb28ae5d92983fe8bb5ce74c3ad4ba03accdb6301a174a3640bddf933fc42a1951e85bef3779b972a6eebde907fe69102a26f3f294d0875ebe4dd69d5d364ecb968fa1524c3a70f5cf89de5176f2a022f8aac336768536d08e072f99a4a1410116d7dadff9c4c83338317581f61abe8482f95679f22f55ab9f4f2 (encrypted)
Stealth Address
f6678de408df84067c64a2ed836187a4523c2bedb25e7e8a6a064768f91e3e13
Commitment
06eb5770cf22a699665a69f6c276e9ab975f6e4fa17b4ea00420e3222b50e77b
Range Proof
672 bytes (Bulletproof)
Memo
6d5ab20c7e810d6b9b1f596e08da47c1c201c5a9bc30500bf27d662d138af99ad82556026dc8102ae07c2a491b9d2c16cfa1f950aa139a45cbf4f723d11a8e95cfd1301486c2496c099c9f6d2fde6ad5866a21d163b05fa951c67dd177f850926840fbb1e1cfa456c88576e81c395ed16e72ca8161274271b262e8351b9de8a7 (encrypted)
Stealth Address
62147592962494d68e8b5b62963a446503701c9127d1fef84d5c4b14a0ac7f0b
Commitment
a82dfab9720618a6156f6302c2a4c19f4d21e7c478bcf459ab05aad2d5b2e40f
Range Proof
672 bytes (Bulletproof)
Memo
a141426da1a3543172083c6f2793f8c2e572ac549afa8d8e702e5cf23ef72af95b429471d7fb4da2cde5e0eafc76f150cb91c9ffb5eba5a9778cfab5e9369225aca712e581271c6603869f4042c7ab5f6a0047dece1c5d5a9ca7b34434e8e965f236616d9063c52dfd00c290c03c78d5f3b4b28074455c0caca0174a89932419 (encrypted)