# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d6a9feafc7056164b4158b2e8ec6caba14a69674ab2600b53c777bb6856c5f03
Pseudo Output
649084b69864716581c03cdc05b078060fb05eb79a7f9dbfe0f316c82033c71d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68b10a0df7f6cf8cb76edbef1a588167d5a2c8c19fc3a8bdd05a30a8622b8555
Commitment
72eeaca6eb4226404603ad7a0bf79b5539f92f38d562b6f15b202edf9ef81522
Range Proof
672 bytes (Bulletproof)
Memo
0e69649c14d8b13f9721270d7c18d1e3e61becf6edbbcfaf3eb3564b53670cb1cae7acf32d2d3a0ed9ad4f9633e10daf077aa396ad15d8cc0c6c0efa00bd6d6e6d6758c7e4f833cd3392446c6d33f0d02eb0cc4b949426c7ae9435e774b7736b339df267532e956e710072671e9992ad8061a024f1e531af5de9f97f1537a4fa (encrypted)
Stealth Address
70811272b9d61e92fd29da8f3cb1b44dd6ce529b01c341f1caa9396709027c7e
Commitment
0e004bcac0a3caba9a13739952fd6767debeb0946739e2bdec71cfd31c755f12
Range Proof
672 bytes (Bulletproof)
Memo
5fe9b47d1124b1fb82d018a55e4559dfdecdd5891ccb311b004b2f39707404b9ef8dbbbc57f59334dd43be9dcd4bef6da1e83036a89cd16b0b927f4caaec1b526365b0ec79291f608a13be4566357e5ca1f42485a622cbabec6c196cf1633ab46316246fbec70cd76206ffb50e35278c601061399f61490107cdc8ffc73d88a5 (encrypted)
Stealth Address
5e037e1245828118cb0312c3bcb18df0dd348ec81805c9e50e69dcdb9723513a
Commitment
48cb22cbe43236c5a8606f29944c68b8e7885d71fd0aa32cfb37b33e8e6abc43
Range Proof
672 bytes (Bulletproof)
Memo
2b6fcde481250a73b7366f58cefb57786f00d3fec30013e2b3c271f9a303970422f1ec61a5450b5439747f728bc621e599fc6b896383f3341a36922016d84c7550c73492172f09017743b8ab4ac4a5c7b99dfb3c9d326770f2a063ba240ab09889577223e9dbf70ef62513ae580a1f69d4767a8ce7004d25a2120a3bb1c18025 (encrypted)