# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e85ca4bc91b52c06894baf394dcc791ea58752f11ce7fd26838c0e43219df305
Pseudo Output
b668047492a92b3858aaae4796b93b090602313a5bfbeb6261bc4c46fd1cf158
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
601fe3a68ada40b7d5c8135afd0db53d85650921dd69c24540255f9b1dff411e
Commitment
42d267ec42c935a1701d129782ad5f7daa05aaba923dc00b4e346b2c5f84fa03
Range Proof
672 bytes (Bulletproof)
Memo
24a04c1e6b5fabd87c74894804b1b0f5c6486f0b039b4c15e180cebfa4ddc63e15fe2e4e92a39ba1aeae0cf340af4c9a55a0e28c21ec17c4b5141961076fa4a1ed23585ff2d5cbf205176a99c8f912b6a1dcca8af89e53a68647a46aa1b949b797f6b8158f1c5c227da0e6ec2d5dc1d1c3c5627f09ed5fc5a60c0ad3494ca23c (encrypted)
Stealth Address
baefc31ec80aac5bcd54ebbf5c49754be122baff72d4e1e537bb2d9569623704
Commitment
b4b520ce751c31474c49e10a95ca5254e3f0da92188b5ee432ba170154b6fd6f
Range Proof
672 bytes (Bulletproof)
Memo
349cc2c93c8049db38955ee7f5e32f1489cf38b43a2d1a7431cc5115d79bc17c7deb54f023be7f47c9161997baf3f2e442d85f12485a4ffa6bcd43f535dfc6032ea9bc4bf784633993e0ba8e1d52d09fcbd892b25c06c04830fecde3a41fa2a001c6872198e5afdee3bb7fd4253e628c3425bd783546154f67dbaad58214e353 (encrypted)
Stealth Address
5e95c0725e7dee4e6d475f41640fa393c2185ef4822af404b4e892676b920832
Commitment
2677e459412c4ce5733e84e94033305949ca2364f885f295d4e06d35d9e85d2c
Range Proof
672 bytes (Bulletproof)
Memo
d5eb3c0d60da3c624fc2203a04f0622dfca722b3a5e54faa1cac1144e6d3f51e8e9fbc288a759785ea7f1a0b18c9629df2c73961f773c9a9f3e660b5df680f6f40c1f0e72e14bba43dcbeebec7130c679acc710afebd8c05e1d26da71a991b6f0304c2e92ae348a7275904352182661267f76c21d9997ec07853a6cc3914a585 (encrypted)