# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
80686329f6daa3bc7ce9d4958f7670a7a344624127b960aad5d3f7a09ed9587c
Pseudo Output
3689199508762bfde0cd573a40de60ecccef7b747907510f9acbb16dfba69512
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
60c569aafd890a386f1f849e6a28248332529008536ecfb5aee56c0d202fb949
Commitment
24e62c56a3c614867f88ab0843294125008842e93227191096d8a68da4fae75e
Range Proof
672 bytes (Bulletproof)
Memo
c6b302514a0f78cf5abc15924fe18d8c50468a617a9835c4857366c473675b1e7d7fb1d2f653bb77f91c041fcf466987256eda231bb290edcdc60ed2e363542428031ce1505dcfa6f63c67bf05d08cf06a9a3bee711e4c4b9e8b51854a054d0bb4ea9f9f57006f6e809425022a5e4a336649c2af4ed55c9590cfb39f3e11f1fc (encrypted)
Stealth Address
2a452ecf519647a2f07021b43fc6f48a2518d5522180f8d84720c523b3234073
Commitment
deb2640167c8862ace7ce4c0fce07f90a304dcddc1d3146c312b8382a949e858
Range Proof
672 bytes (Bulletproof)
Memo
813338cde2cab86635e5589ae67224a9af13f3c45ffb5ff000248f0df0fd68e570d6da48fa7e5aaffedf3dc227b61682d2af3642743686d4a8111cef2b33b254ae25168780f0cff1102cefddb2e70f7c18fc9e56535514a07bab748b2864c581c1794836df27dd2047f99ccee3e6d2e5f8da178bbe52462208d895295cead0de (encrypted)
Stealth Address
62b20b0fa78aca50d73880c52090bf7e048d1d32749ab194c7cb069a603f8b70
Commitment
b8e03a458bff078bbc6e9f483a8c279a3d3d697d90ce7c24d22e4d76ad9cde05
Range Proof
672 bytes (Bulletproof)
Memo
c280ef5f9302d0c62499122d453a01126537b160acf42031aa506a6b100248d046e233a2728581dbf022a3d6c06a8d37d5c715f9c5178a75dd306ea132525713ea6f999d95c4418eae36db44b9ec92c80a286739142ca843a6afc2c083461be51e3486f603e9de4186d5b8f6b6b79f96201f4def491033da543504efbbfd49dc (encrypted)