# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cc875fc44aa00832d96ee890aa7c004fc7ec92347380ef5e52b7cf088dcb7512
Pseudo Output
8a7be58f9c5326a518437edb829cb56f22f208de6bbb194cd2f13f64cf6de54d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7088dc28f76139b51ff716bb12f04c9ca8d3279120429a87494a1d9021d0be38
Commitment
6a0d70552584c5290343b46a5bc47e177bef55343e3e35b66e884e1494c56834
Range Proof
672 bytes (Bulletproof)
Memo
f1ebf53e81990e2e1546028b8c07e4ad0650e448ba3ab7715c06a179f08f7f1821b90dd9bf98e634699573a1daeef2bf3a7f203ccbce3325b18852092853cc58511ff11ca44077f0cd6b1f54d30598452178034476b069762cd8662ccfab6959640bbdb047c41f5309a5858befbd30975dc923baa1fb54bf7c8b1e46c8ed761b (encrypted)
Stealth Address
2c72fe1af15fce1afdeb6d65e8d88baa8060ab397084a5bd67bf6b58526da64b
Commitment
3292740e530830b1ff750c26b3983c475b393b01280dc1b88bf5aa2f823cc636
Range Proof
672 bytes (Bulletproof)
Memo
9bd13385e38357b2877a4e7b467789de8e6223a39c972fd324915c165548782b6c3df7a2bce7d3f0c26134d5151c024f3b6ba736b02c59f0e0c944f6b2ff6d1594a0baffc5b5c8ec4d8ea4d1cf12ac88990ee7a59ef07ca046a98a885bf054a236cfca350db23d49911582cad66bf341f2bfe8a45e0485eb757752fdc1299399 (encrypted)
Stealth Address
5c74af7aa45631173a5e2ef5072a06bfa3faa4b7a40532168b9c84a085626243
Commitment
7e071413259211565544972660788b7f72fefb20b0b3fc65fa124645d6b26c30
Range Proof
672 bytes (Bulletproof)
Memo
a0875d36bd9e16ce8d2c254d3ef2245fa4290bc3d892bdcfb8dd6b871f2a2017380b5825b7e9d3d44d2f9709332de8df2499e37e8f8aff62ed482157935debd2c15f4eb8652424bc6af9ce851403257eb336b54fca1691e7c0cb61bf32b2381ffb955247ce8cbb234e2e96b498c3ee88ee102ae33e7cde531c76488b975dfd4f (encrypted)