# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0c1713bb117982d897afcf82288ee99d608af14467031b00bdb49727d69e6d0b
Pseudo Output
4c09bd08745fd960aff04c57a910eef800795f8291045928e954ab9459047075
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
62df31389cb3f49ac5c12f6a67e6448e9736047a70801f4861f31c19de00a531
Commitment
c8cd91740be99ca633c0b3fd3a255c212d2b61438b4dce3c25223d6e77048523
Range Proof
672 bytes (Bulletproof)
Memo
6d93d80cbe7b08e79f225abfc85f0b44fcfb9d84c4d3372a63c546f06f4cbda74af2d1610742d62d5c27fbc18eb1e32910c66a2d4f89349ea179989abbf06f9acbf8e0ceb4ff7d02104cc82723c2b484499302e1fc7ee257d99bf5b6bffbc2e7f0af9d2f91321214d6813821303132ae52eca3f6986581d2e9c68b7207851bff (encrypted)
Stealth Address
4048b27254886fcb2cd9d54593fc5e21c4aa674db23391799c26245a217a1d74
Commitment
166edbe12839d80daae187177fc436813c8232d49af816e003dabe314361fc21
Range Proof
672 bytes (Bulletproof)
Memo
547764c95d491b5690800c353324dd4bede7a3f44093e1cfc58bfd23d603b1c186ec285dee28428fd2e212dde3448722f688abf768801ba9993afaa8dc1002e5292af4d018fe11cb5436a3db54f4fb812ddc9c36695bc3dc97d1e5f8496cf48f1f91b32c7cd807b69fc9e83d5c62ca58d167460da52b97cd1d6499f2b0beb634 (encrypted)
Stealth Address
589c6bb5fa2e339317ef85716bb0d8c70139bb86e0df0904583a3568f637e33e
Commitment
62193a31ccfa3b831369d5ef5ba393a2487c4adfd79431afdd09cea85aa2db64
Range Proof
672 bytes (Bulletproof)
Memo
00b9f14a841e237aa39eb5fd49ac19adfa8704aab046bafa748fec46dd83b4554561ee1b75b88e25427008807328dd48481f0c7ebe8a6f33edddb5268c291e8edd788ebc032027f0af53754f04c4a84a6064a602200723a73b4bbd24bb7e9a0a368c828e9c08bf6914d0ba74995252b5894e45176394a0b1e2fddb22fe9948f2 (encrypted)