# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
44275cbdd9f042f437e942406b62633ffef855c1f1fc2f863f17857fccc09721
Pseudo Output
68a714ba72090077cbd7b9d2c4a443960133db1fbe63b21b709e009d0a5acb2e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b8c374639f6060986ddf66cfd6e74c28efcee5173394f7eb0605a9a700843a76
Commitment
f649b5ed894bf1daac5fe93104d81cf3536e757edd74df21e936df1173f7cf05
Range Proof
672 bytes (Bulletproof)
Memo
c6c8affe80ec4543ab1d7c0477c6e78ad873a39637b2217ab72209b413841167dc2c8f651cd6645d8d88653fb3ae1fb6d1efb928f871e1b125f78e6e5c78d4ccbecbcc583ba60c8cbfe79878ab9d27d03bafb9714054c206e5192d676dbebcdc2b4a49f70b616cb6ed5ee1e820e0b1da21210e16431d028b34cfae99792b2264 (encrypted)
Stealth Address
b86dfaf164d339db4e8fd43ea407e9f6341a48411f99e1c75f73c86b705ca977
Commitment
723ed74558effcd01506b360ec020f335925ee63426f851c291577cdbc7fc214
Range Proof
672 bytes (Bulletproof)
Memo
c0acf12485654046526319934afd98c2deac1db0678df527a1bacdd52f4213e5f10c71c3703cf237b780380208a4663c3ac61f848be3400828be95720f76cae23173d2a63fef6470d55aa65831c80f16fca1fd260232156325bd8f7663acf6be03f0526c4771aec6fa5de980e7142afd781281f331c12c89e9ee38802c33f1e7 (encrypted)
Stealth Address
7ad199f827f62037cb0d72a0d042eb34c9315e19ffc46fed5d7562385db49772
Commitment
d0a6f0f70fc247e58d493efe8a436b7881626b26eebe0f70846f36fff140f551
Range Proof
672 bytes (Bulletproof)
Memo
3cd584c873bff7cf64b63abdb46b809b8913318524656cf5d95e256e553de456d22200d5331ef3e6c5dcb73991c1a86ffc698e87c4dcdc09bb8be5e7f21e282aee0608c5b33d60b2a16b2b2c90bf4d626e81199a2244edb6e74b279204c0ef5875a73e60dea5e42c6b7be7f21f83b1a5e71e9f8ee44f1ac4fdac90b5ab8a99cf (encrypted)