# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
68e0335bb4da47642fd012682d2d45a73af940c6789c89834874bafa6400a740
Pseudo Output
bc57252b960db8b888e8a6f939c5745dd5a54ae11cb0b7995cdb303efca13e74
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f2e90a792246160458a6bf42fba531921cf468a286d68b075013e78c170e7a7c
Commitment
5004d444e7d55ea9aa78abd98358a62793718eccd3624f382532397a55821254
Range Proof
672 bytes (Bulletproof)
Memo
bddc006811935b4a40364b95857740d16ce02ff3751d9b4cf8236e2d2d9fe28c8d8d51dca94f0432f0a4c01c28fb7dfaf43a6b607ae11fc8f8071e97012ea1b424f3c92739b56d867a39fd86aa512a8640a9587a8da0d922291d86aea1e7163d39ab9f3f21229048b0fa740eb8a2f9c5cf19578238afebf0c45715d0223e0407 (encrypted)
Stealth Address
32f09b6790a51e81727a9ca4a4c3f7526907eb308dd563927017af75d142a831
Commitment
2093ab8fde213fc4b7f125a9a719cd80ab054d9a8c7afdfff40fc0dbc2586b3a
Range Proof
672 bytes (Bulletproof)
Memo
9ff93396c63421f4e5caddd3e76ef9bdcf6f2063430240ec74d44dd0b2ef39d05cee9a3b6f69f404cf4580e24a607c2e6309c8813c04bb00feb5537e1cd1fa9c819ac87b371de20e7697500af6a37d596202df82c47a1d77ece8cf2de5fb8a0cb39e3f285cbc577e5b34ead01944f71e8ced9b1934d8f451aef244f787f62a58 (encrypted)
Stealth Address
d8aa9c790fbd3ec96c0bab193d47660caebf24eb2dd67ae12eb604def9fe2731
Commitment
a6085539311b680eb36cd198ea97f56eeab6485013dd889aacbb5851efacab1a
Range Proof
672 bytes (Bulletproof)
Memo
5804486dd52f1b3f685214e74a0dd85dc36d582d96f39e00126808e684d2c759ec08ac8bd8a0dec21e7a63637a04228d909b914a029583b42e886583ef71c0e1b4f221ac5f697f3ad71ca14b95a9d2ed890efd6cc5f34ed83c76fa96e784bd4dd395821b185a3d9f3ea40b764c80a9b8a395d60b7a8d5583d601be96725ceaa5 (encrypted)