# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6cbc7733d8b4ee758d43e1a152289eb6dd9e2ed00df559b18208281633c71074
Pseudo Output
0285ec1ffa48de13a469497446e0c4c8ca5a664043e651de84cdb76179a2cd66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12b743ca8fcb48d04a57eb1e980900795061f3890f53aea35adb85a2b8b8061b
Commitment
06cd6a0558193667548d5e8214ac2073cdb392cb1c7082da99f038a14a9a133e
Range Proof
672 bytes (Bulletproof)
Memo
4e0b60241eea4859d236c203d374eac7b5947dd7777cb2c63cf1bcca7dee506b4ae4c51581217e5e33d4f3b411124a1a81b01b5e519e0d85b5af1f4b3b920364b0e9cae68c0f01cad60bc8474ee4f85b5ede3130df572918e4f22a05732c068de87dd8e22b49243a017885f514febfec7a99e33ee283d629c0f5115490b606db (encrypted)
Stealth Address
cac46b334660236669227b86f27c6b7a4da665d938487431407cc1a1dbfc4f2f
Commitment
0e28d09c17d03b316aa0cbd4a20ea15952470833dc676179da283f0ec733e52b
Range Proof
672 bytes (Bulletproof)
Memo
50ce050d10b5dc66f173f859f688b92653af607a51ad6c694d7db629b7f7323d3211c227cfb90dd026ccf88a6135233d585d8ae3209fa6d874469c67802431e665aba88e033f015f89ebc4bb0560d71a119c7f34888147a0394c45d5289375d01862f3c540a47decad74e420048869b9ab5380570a7eca05cecd88dc5c033ad3 (encrypted)
Stealth Address
a89d07ad5b6da85187d5f4cbb91e47a3dd0521fad4427045274cf356ab870154
Commitment
2a0c36753ee29b2aa60f24a8f09774b741a89f6dbd3735a3190911a4ba90295c
Range Proof
672 bytes (Bulletproof)
Memo
8ebffd202b6e334f0d12b2c0f5ac61ad3448212f4d8b0af2f09c238c10b99c07fef9c8af6b401384213d2842cb0aa2195788a3bd6d4f6b990f221d7a46ca6ae2852355d346536510163ce6c9f2a23695fb8cc395cbe89a5afe3870513c2e3b35da8296724e102354715be91a096c1c5ae5423292acb1505e3f93ea3feeeedb6b (encrypted)