# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c2bf62333ae0805f09de86f90800127d0805dd7d1b0719570e9d43dee30cf39
Pseudo Output
5ce366717662f43b50f62248ea25bea584dfebea192c1294f394f3df6d0b471e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c64d028828c2633016261c367a86e0135e96a5935c53d683c40e256ccb8b886a
Commitment
0ab5ae4c3d37666e51165f45d63b338c5ba429893513de3a4b113afba0813b69
Range Proof
672 bytes (Bulletproof)
Memo
73bebdf98871e3138de2f763a9ccee788b62cf73afac0e6dadca1c7265a8225ad197ce474eb861ff4a162cfbff4558b327e516e6c314d6e7beb50db5f2188d135aabbdd5547064db1adec0b892351601b3ef048aa043551bc5545a773a675f9b79484f126f3e9d207b77991e8bfab81a00b3ba16fddadf34ac28a97bf670cb35 (encrypted)
Stealth Address
be75b88995ceac526f4d19983729727c79f322bd7572aac04304da4a19f3b03f
Commitment
4efb33cc56aef8106b4ee80fb0103f823babf656dc9cba7f277a48c05975b738
Range Proof
672 bytes (Bulletproof)
Memo
8826add4e7ddab7698d7cc10e9f21384e5611afbc84be108a15fed829554f22b63627f48f2731b161da58e3d2f3be360de1c33fb0c8575d2adfa67423a9a23017744a7ff917392438c5d70dc704583217e62d999bbf4d108455ef480125b645bf07bb0da17dc859fc3348967db51ae02f65663bcf36a1c196b74d47c2fcf8c1b (encrypted)
Stealth Address
1a625c06ed17a1c3427a4b2e186e07a58c8cc6197718735e0e6c94f40321140a
Commitment
84aa26bd5be723b2938830a73c0b0df90108b486f6d3e3a9b004e070c76b6036
Range Proof
672 bytes (Bulletproof)
Memo
0efabdb831613710507e57fdd71c0de932eb6a9ae13e09039d86227a54dc6e23929f4a775204593d9d658c24d9ec6c8ae45e26dd0f6446b35930f780c8c22d72a263656e3ea97cb4c826861752cacfaeed75426f6e84ea7517d7c78330d89718723dda49c15350ca03a9b72d1e24740405f7c9338a57598c2c7e147a7c1ac035 (encrypted)