# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c428dab300740d6977ce57e969da5977fc5fa1d351a407a72bc2cad5241eda23
Pseudo Output
f88106816b0505351a3a79de1fcd7e08bba4b6185255a352e5a5817df1464c77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b0c15892b120b76f70bac20b8f19a25194a956a55e8ac5c040602f58286ea275
Commitment
f48936d520689df8f712a32270102bbc634490ff93b589a96dca4c47af5a1928
Range Proof
672 bytes (Bulletproof)
Memo
ca07ea4ac9700e274b0c4ef97fc8d24fb75dc7836ecf6ae3526cfbfce9729f57259d82a2e1de5b1bfaaf62f2d5a05a8bd6bb6d04571938314f2368159f480dde9c90dd7d6c32828ce9546ee96ab3b44758dcb56242969d29909d0e384d53d8a47748fa681f35d432acb08369e5b369da2173bce2d31aee87986568deb7f0f805 (encrypted)
Stealth Address
74d22f85a86a34c9e0032b11b9a7ba544abf6cd61dc0cc4dbe9914ab7c808808
Commitment
f8269c6157beff67a27137b3a34bc410fa78699333bc4561b43a8dfa4c165619
Range Proof
672 bytes (Bulletproof)
Memo
b7287d5f92236dc030afd820c32a5451bfc99abd941f71dc61f92d248c888df8993805e0ae082ab823e6b097392477f7f6f0cf5042ec5f20dbd8a1c39616651861b05457d62cf16bdee025db1611087c230f833764bc37df043728ea3d7ba3dbe57c56e26f345e0a51280e4898bc9e09c86e781d319afa2f6fbf1de1afebe908 (encrypted)
Stealth Address
b2a08a5b18947668e4ae3bec7a4a8dab6169b7e02f5122027b223d89ad2c764f
Commitment
d474129da395803903f2e3faa92c4edbd131336b3aa9102ad0637ab168a06012
Range Proof
672 bytes (Bulletproof)
Memo
960563f66a3a4ecb745b853178ba137b2ee46de4a2ed455d30ecc47ae8580d16a69703b453608773d28c3809ebc4153992f6c1de01c2f11a7fab7e3ff321179e8f65cb0e76c627edae6c28cdf9ea54b508490f69956f8d0532a9eff9916d8a253fc543e122fc20baa62306ec47a121430047c184ec9965757771286975a86064 (encrypted)