# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b82263613ead7e8210d43d06131292f96bd7fe012f7c5b0e279d41be4408a162
Pseudo Output
febefa69ab24bc40b1f8c753003b7592d3b2def867d289c3c6cb8f6c913d6009
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9446c3c5bab3230e1baec71d8bae5d41e360d4596df8a44305638344250bc267
Commitment
b0eaf5884bbf59b10e1cc090921b379e6c88325da45be469bb4e5c157d987768
Range Proof
672 bytes (Bulletproof)
Memo
d94f1ffb6326ac4ec19fe2e9939cafcb2cd0d3e10569ea710bd8533c1e0f613b2dfcc8b0060deeb9dc2fb48b71392e32f4e84631fc53f590715392617e9147e2333b8b4af36bf20960ab23293935f574c8ad8008a58b6aa6fdb02fdd3a5884b75160293b282dc1d32ea9aa167343a39b6456e17d987e95902ac25e66c6ba8e15 (encrypted)
Stealth Address
c4b6c44c1117f16e265e1c346d2e24dd4f1a9ce21a76c48dac23bfad94f10d58
Commitment
082ea391f72f00fe0c2913e052b98d3c2fb3862bddd162a03b01b082def99970
Range Proof
672 bytes (Bulletproof)
Memo
11adadb7a121885a3dd2287ed4c1a4d1858c2faa85fe2fc7d787cceb3c8f77d26dcffc7b2bedf22d364fd691f32e7973b42087b1fa57f73d899112b2c62aefb328cbe0fd54e47c8aa4923a636c947a65d1ce4d5f1d3089d4a590d614712600d06f2044aa95c7a76f2ccace64b7a744a42d5dc4d8195ed208fcb16a8371ec5315 (encrypted)
Stealth Address
be40f3fdd53dde655108bdff7ee05f9e40c907f004e883c7271017fbe8a75d1c
Commitment
c6affdcd0e1d87a998e6b2fa981f138ba7e46fb976c02a87606949db6e7ca652
Range Proof
672 bytes (Bulletproof)
Memo
3b53457f5cf295d49db0c0da78727650b1658df3be96fd609284cabe49e30a8bc5fa4dce0fc84532b47463194612afe6018b5635989816f29549c71866580678c1d14f038011d49b38641294e5c8026528eb231b689a0e64bccb42b8d630fbd4b01f5b839783de492cc43ac0a71b9e00ec4b9679811ed4056ddfaa4d0fdf87af (encrypted)