# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6a314735e00264a1eb91c56e6176e398874b8fe47727a2fa0852f27f90726620
Pseudo Output
12b907ad8584ab1b219c10507d47c73aeccf0757d8f64928fc8708600601482b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce1d68c7f0595104316862ed37bc9e68e81d51ee925e45874d48ffa0705b3d4d
Commitment
d0eb6098250de9a01062edffb77c4c1a0443fc1e271444f53dd5c4745057a67f
Range Proof
672 bytes (Bulletproof)
Memo
b8a1f5be5215c58f1fdbb3b81982787b28f9be995dc0edc68c3766aa44d65907636cf644b7a830dea395d4dde037879ca9a90fbd10d6f0813bf5cca67dc665a26ab9e767d3c05892df25ca12d5c85d344ec8a4bcc44e8b6c86712ca01581be1da6fe4f9e1154a33c7c0124d1f070c5cd3db43c622db59469f85d92ff6a38abb8 (encrypted)
Stealth Address
b4265564cf238d482a67d71747a3ede7444c651b03aa78fb3545d9ef82334676
Commitment
a0b31371fa8a7e9c7d0655c36c2a240393cbbda1564ba6793af39d20c942c100
Range Proof
672 bytes (Bulletproof)
Memo
a824e2676d3f475f5026b1fb7e0a1d80dbf07e08b6eb364b502312252263f79c298f4c4d7cd2b4071644c1005e3326bd476502f7e336853731553bb5cca496d751531956f64f3c19dd19e3a7cbd6d97a483ccb59b45b1a2a9eae6fbc909e01c1a65704db3d4765ada8dd5d699531d4d674462c5c8e6780a6b7ab5a886fc3acfc (encrypted)
Stealth Address
f63e298d801bc217a31be121f758d0f00fa724aa7ffa1a1bf183618920df1e63
Commitment
1a84ef94e4f8cb19c1bb7bc9c0d10010ebaaa8bbbe41884602ac67a381383433
Range Proof
672 bytes (Bulletproof)
Memo
db922ecf83d42e0f7585606a2d714be55bd14b2531f51e58fcfc5984bdaeda66b99ffb15af7cf232ec7a2db51dec07f286f2e7131731a713d74f607a1253106f5f59d2d8bbdfe73f746a0b9ef47797a8fa35082982d6f8507476830d20c4ab9749fe822b310aa527173cefacca2675c6c0d4c9b69f5975399d173ae85d19e1fc (encrypted)