# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bce209fcab86c4925d58ce562b4103c1526123f8a0664a38c345ff31aca0b671
Pseudo Output
9e66b019b15aab044440bb2bec76ac78b48c38208b60b828f61ac6239b09bf40
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18c07bd48897b8eb6236626ba0ed4d560840c94e01f4a4e07616712850311345
Commitment
d4bcf570ffd462d0e952f5e7cf501702c462a01ff4574fb02ca75115ba509e2e
Range Proof
672 bytes (Bulletproof)
Memo
8bbc01feebd9b4029883893b8c48eb83f5b7f83210f01be918ece35346a22e9d7c9561bae74efdbbb9f406fa87ae56a5b8e0d27cb4062f30d0e8cb9807a3b941a0acfb4048f267f0d6532fe59dfe1b25e8fa6c839aee8716eeff2c0b8f27e08d69b00eab321f7506dc0704dbe230c318c659a29fdfd85deb1992d25e362574f9 (encrypted)
Stealth Address
b29bf01866aa823b27a5aae9741d0805bf67e9fd7e0dfcdb986e3875041c8e44
Commitment
bef544411bd12106f57906ce7c6233828b9a0211907b1e8c4f4b1609489d2809
Range Proof
672 bytes (Bulletproof)
Memo
b1fa66ba965f38e46fae5c49317b5f50e3a8643d56f32116b3a51afea02531639fca4263a1368db6ba711fc7986a73184184f411fcede911730a6260afc02a19e4726aa1eae4d7b07f3396226599ba88a95a5903b1e8cafbdc8d3c4608e39c84b155fb2eaa1fc1886c928bfb63bbd6ff86745d4aacffa2a35ca6ff24e6e63764 (encrypted)
Stealth Address
60349f138ae8cbf475c3da51899f1ccda62b6b84080aabb9113f47c949cda641
Commitment
e606c0c85a85e5d7150ff170d55d5fd7c1cd5b8c6ca463bd638f2cd4f9231810
Range Proof
672 bytes (Bulletproof)
Memo
587a1ad721dc8b577e2fc87fdbb58caf2abd843a36b504b9a2232570f83ae368f868574b4fd4b4bb5cd9febb7eab839a23b1f05ed8d665f7843fd800032b0f86e69ea067bbb02ef336c7eb85e5fe10454c4c366ed62cadce6ff2f6fdb94afe17d3f585b02602791dce993cfcc2f65986d76980610b7d8d85b5d0d3fb34bff48a (encrypted)