# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f47572ede9a7e152ca8d341087e5768a972aee70e675893bec2118b5723d5366
Pseudo Output
1ed76645067436833d6e2672459def8c62ab45eb17345d604ac3881d07bf167c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8398020e3dadaa3f8c6b5c8d1d7cf568a12defc48709cc7edff368b58756c53
Commitment
b28818094c43d379f2cbc334c822c25e693c33de4155ac5c6d59bca2dfb60d0d
Range Proof
672 bytes (Bulletproof)
Memo
6ec817e10833cd8e92f0e37eb13b8294bc39e49782731ccc5187b4d382420f03e6f14b3c1607a36f42f60dfd691e146dee14e37c344ce78b71bf68aec95b6ca6710eedb367c7c983be33774f65664cd5a4b39fbedf5d44e560d0aea6258ec4352f331e2872090bd78464fffd9cba32fb3efce8fac6f331c981068846009e902c (encrypted)
Stealth Address
82268167471f783f664be6d49decf55a48cb754b9ca8aeb966c6b42dda97207e
Commitment
c8bdd09ad7deb31f96c6dab214feff42723837410b2f30c9a4666b151eceab4a
Range Proof
672 bytes (Bulletproof)
Memo
71ba77fb08e3d41a2c66ea3e24c89b09ce3b58d7b6a828a1b5ed41fd1ebd1581bc95a967251d2fc50a9ab66311faddc3231de2d8e16f8c690396ada1a99dafe869920322ac469b28ee22c1bb3874bfb2d90bd6b6471d6102ef8059e0fef834db0c9c0bab09bfbddb57b1d4a842e19a0be1fb47b43e5d37bdbdbed167201fd286 (encrypted)
Stealth Address
8eafe73bc80733a56fb6cd09478eee2a02f0a8e8f5c5462d4bd3127d0b03d962
Commitment
201f9ed693f445f4e9d6c092830bda745bcb4ca090f40250c355d98c39268665
Range Proof
672 bytes (Bulletproof)
Memo
621920d80fafcd40d21802f6a632d4fb19d7ba07ae15f40717c5c4a8e371d6a64d311e7c08fe4e87921eda636fb7a3ab10dd677c55ea21cae9eb20af756b5b45f6a917ddf060922ca99c0ead0abf1fb055e96856e5b18954f6894f4bbb247bfa7b896b8295bfd731b6b7be334f67c462e9bc1df9ec433553bd78e4702545a240 (encrypted)