# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a2fba46f8973b9924f4c3240bfc42110d9bd0281a288ac1b45304d99f338dc50
Pseudo Output
36aa7e66a7243db08b805795213dfe97c08d3fab075858fd52bd0b42a4930a5c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b24080fba5e8af5c9fc5bd5dc5e864ef28cfeb0280db0357654761f20663e559
Commitment
38abc6089c5a1b5401d8da48933bc569300a1a50388941ed682e9b25c5fe0e12
Range Proof
672 bytes (Bulletproof)
Memo
bf026d21da867e0c814c1333638d4c08a42b294cebe7ed374a92a5d8ce44cce28add2e2f0525d9d5dfec34dfda87be24bfe0ad50300da8ca154725a1143980fa4ebaf41844d26d971c644897065486887d686716793aa5f338c580dca277a72abeb36b7bbf1bcc5b0e7cee9f5412b866e7b97938be6bcf7b7f63eec40a7e7721 (encrypted)
Stealth Address
fa9868f2bec7a1d85bc9fb6b221a40901d05eeefa7ee3a46f130c8dbb209807a
Commitment
86f0d5253d2f3dca6c93e93fde7fbe95ad3a249075e4da63b3eb4a7a0579fd08
Range Proof
672 bytes (Bulletproof)
Memo
bdfe8c40df99664290defa4a947ee979d9dcf3355bf6c57151ae7d59e92ac37215522dc1b5ed8f4b2ea376049297c4c196ff837cc2c9b5b02d9d5809adb26b541710196db8283d41d8bc9601a83274b13604922a141c4ce6805cb6d5a80467333e42c5bd3a0af096f465d6d4e8502b6b9c20c4f2f09ff13bc824839cf49dd747 (encrypted)
Stealth Address
0ef210fe6f09d121086d9d26d7d25f2960daa4f33506c81f5c8aff866d7d263b
Commitment
ee3f35e07019ad84bf93292462659449929860cf2f56cabf2c81a91717c32616
Range Proof
672 bytes (Bulletproof)
Memo
44b50bf5ce4c09f7f1dad36b8132b5cdb1a5951c7790c9554ead5fc5b66bc47eab95fc5e53a1252fac020471be14c1d9395f318b95fc33eac0a284ad229ba23e8de8dc846153a83e07a5567ece86b94f91316fd9b2fe5389ac3cd02ec258a1d0f3f6db988f0dd879059b03220cb5eb52484ad5a0b1eaed34fadf4e04b6f29aec (encrypted)