# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ca695ffd8b818b479fe672ea78625a71f1e1852a9daa663eaae2fefe6b39c06
Pseudo Output
5ab647011edf5f7f1dcc1b8ea8479c5ef1e49b83d3799903a42fb5829698b018
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b8cc73ba8bd0c8392b87a3506c755eb0e8c98da7034a55fbcb977938ee038c54
Commitment
44da28db6f07e9dcb21b6c74730b6931df9ff4e6d52bd077dc16886419937768
Range Proof
672 bytes (Bulletproof)
Memo
ac1ee1a5db286cc2718e196e6611689bd914846b3e166250d897252485287464cc315719d76a96d99c9e53b88468c8092cc4c1f917bd6563991b935fc7a6c83db7026cf9bc026550c917502b3cf3d5a99f69b5383bb7aa5e9e22c74cc5117e9bdf08548464c3ed01135c6876637d0f09e6beb8fe299a4e1e8507deecdc7b50c9 (encrypted)
Stealth Address
9857644920c36997a5d444b56ee537dbf92a7190a7abb4ceedeed96d7ee5c26a
Commitment
06fa6f82e91e9b3d8d0e99517e4826bde62695aadbff2a9cb93c389e87469657
Range Proof
672 bytes (Bulletproof)
Memo
8c60a041f23937a8efc924cead046f7e9243ba6dea9e078d5f0030499216fe44b5f0e27fa9ce84bd15983a68e67c55a2b5ea0957b0fa451fd708866db265e7f8a0698881cbeb08876c2506b6212ef829a6c2cc1465b2589359fe0a50d9b966f2c3982452059e6836f449bf1ef90267ce0f2a948d667461aed5fac264bd402a28 (encrypted)
Stealth Address
fcca2154d73ab0a31173c3523478ec1ff0ea160464c444ff0186e46ceacad077
Commitment
b4ca9c510604d8b72e68476ec2c4364a1629c9ed2a49a057b9b24f2b99354676
Range Proof
672 bytes (Bulletproof)
Memo
b080e8d2e2b49d54a67cf2585f52626b4dbd75b9dc6cd877caf380e3515a55748da697a63484add00b60fbf881d7483f2e45cdf8e4242a7e3ca0d27b1bdc144a9c6302cdce46db3cebaa39504d116149666da3f9aeacbf73bad312e145d64bfb89a766ed2badf319f90e9b66ea41e8e78e022df97b6099c7bd4d6d8facd41b67 (encrypted)