# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c6436ae193b78d4969f0595bc29b293b7458977e568f6833caa38239119ea1d
Pseudo Output
e429261d40738f651f1dae77973e46ff173d9df1a106f7297b39413d2bae5632
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
60a2c295e70236fcedf636a9eea240c3a920446353c05340f71f31baffdfba2a
Commitment
76153121653e5714772c19971164382958d889994e9537c7ea1d253fd56f874b
Range Proof
672 bytes (Bulletproof)
Memo
a68c7573c0541deb3f046eb3fe4852e063e460b1a81aacbfb5e4b7b7f0e814535f361e53d690f8e7abaf1161906aa67f63b96293540c760826a37d52b3d7f334b2540a2da734ff5fed46d7adbd5f52605d5e49694bc76629e7ccca34f6412ce008fd28ad8f4096ee049269d19ef4f88c022b9892401f3d0eb02133430818e2c9 (encrypted)
Stealth Address
c09b2297675f9a2accfdb8332e2521946007d74f3021823cf0b92397e3c19443
Commitment
5eb6ce10ccddb12ff7c67092b06297e34c12b3a4407cce9e4e950673a2de4739
Range Proof
672 bytes (Bulletproof)
Memo
6007879c255fe95e59cc994b802d4b39ba54034cc9bd509cf91a895d79e468bb1dcc9e1a9df61a498401203f293e6034f9229d2df13e877d735275ad4072aa94a06ba85b8d5e38f1ba8ee61cdd8474331c8559fcf7cecc5f7941d7a0392d647ff7b0ea5d41f2e17753b35e9ccbeff36cb07f8355e4fc8deb14c8bf6d4d3532c1 (encrypted)
Stealth Address
c4ad364df8cfc9a03458300d2f8b198c3f6c5c8dec2c80fe0c31049196422644
Commitment
a242e3dcf6c48d99c1dc3dff59abfc48f37a7648d2ac67c0a14763e93bdf1e0b
Range Proof
672 bytes (Bulletproof)
Memo
d70b6b80b81357080265c0541bfa567b7741282cb48a96963db6f867e6098f9f82a87551d71c5b0fc68a0a6d59cec53c6af1ab2b7442fdb2ed078983fdb1bcabad899923e7a18e31cf1a39043c9c8d0b23c795719d994887d2c6af260302b9169078d77812774cf540d01de3860e6ad28a2515762b242940c21151d781c609bb (encrypted)