# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c629bc12d2f88bc674021b11921a9769543a7581de7b296a2085ef00f5e65659
Pseudo Output
60956993d6e69fb1e8c8b347a6881b5c47dd213539b0849c1eaa5adf453a497c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96ec7d824a6f7e9e53b60b37c44420316a7bbb43a51bad09cd8421736a884560
Commitment
cc67e66df600abd9ac1713b1365a464211ded9289965f007cb2679a7bd624147
Range Proof
672 bytes (Bulletproof)
Memo
f8b1fb3e0fe03658d8e5be86f98e0ed260982e09cb34e6c2c30ada2d4596f3451ffa513e5262d00ab846f08634c7c1365188b91ab18b81305014f33e1bb4eacb94d948e2d87eb7eb43b393131c3f09a9c53cd1aa62fac4f71c436240bd71612e221aa12b9a27bd223c42e5153973a8c0ef64d5b54cfded46f323b6567119fee9 (encrypted)
Stealth Address
92c48e53d8d5157ca33d8a383ff69c7e7096021b26d9db610df45df8a1de4f42
Commitment
5841adda51fd730c4ae0d015e84a813c4f2d2e2c5e948c868fc4ec876cca7e20
Range Proof
672 bytes (Bulletproof)
Memo
67249451e841b1983608a6ffca4d0e73bcc81b0bb480f77907437df0876ab553ac7188d5feebafc9a34ee006846be1ea6bf3cdf2172c0d86c708514cc8c7a14a846367c393b48e838913333c19b8361bc282f8381e200bb2f5f974e50ab18ace8d3e1c02dd50b9a9db0e14bd9bc31b8699ac07730bf83adea86dbfb96ec971a7 (encrypted)
Stealth Address
e8921d998ad43508da8234f6c79d5d56f0ed323b57f823413c79180e9c46aa6d
Commitment
a8c31e9cc76a24d503962ccf2dc1a8080f539e82387f0dbcbe3fa2309429087b
Range Proof
672 bytes (Bulletproof)
Memo
0b375dab7840d0aaa180b43aa3f9a53d3fde116e82d5324467330f58b496131f831533136fe14f07321c9427c37cb7fa7a1b7a958ea1618a785a9b9b7e153d557f4d69021c2aafb127f5cb6143b965a82bec42ec06ff7d254cbd007e2591a648d0b3f783e8a78e4e291d972af24e2439accf662b3bd765eccf4b64b7ae7f1985 (encrypted)