# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f67a6ba1755e23e6ab032f4175f1817c846c359837831bca6fb2196a5ca22837
Pseudo Output
10788b918824822ff504aa1dff4a90b5de8678e8b180d87eb0177d4f0348f21f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b49c295d8f693f13f8c042f99bd58260a4f28b64d273ce169c3d9f8c6255771a
Commitment
e6370668120a6bcd5638e9ab97d4b093ff32a443f5f4bae96e455e15ee7e8a0b
Range Proof
672 bytes (Bulletproof)
Memo
1a670374ecfbcebb8d8fbec95dd9dc3561939ee7b3e1c6662909ff72076c799011ae1c5b28f70bed63fd24c2216b3157b62720c0aad6f8a3c25e298b4fd4764a5726db3816a258cc513c0cc5d3a59f8189956ee47572483c66a0ef2ba7417c7d3dd745b687e6eddb048a3ffdb0fbd3115cca277e3e2db6a28c575b861d3f083d (encrypted)
Stealth Address
8cf44677cc51f87c374a5dcae9b947afeae8876e887cc99577624594604b8a51
Commitment
da2b70f80997d071cb12809b6e649564fa7569480f84268012361031f14f8051
Range Proof
672 bytes (Bulletproof)
Memo
ec278b07be9acd9a9e4dcae70fbf66a989910a5c17f76a80a8e33e3f0a12454b1536a3718294e4f41555308c80ee4a3d32fa8a38c2c3a7735448f5b4bfbfac447ea6208c4abd052cb4b6f691f094d69529e67551a61212c38bb2588c24d52ef7d5b52b2adb3a9dec6c6d4c308e95b8f8d798fa104dfa8541efa708aa38445904 (encrypted)
Stealth Address
de47a1f4215ef7c1a4b2c8012303ac6a3f3d4980111f6295ae453520f1a1f349
Commitment
e01527cd4741171577f387a73ffa11e364150eef9ba4b3765d89924560d6ff01
Range Proof
672 bytes (Bulletproof)
Memo
be819b7f902d0270356dfa235b9b3ec0081cc810c4218a2cade01a977ef7997389d7bfa359ff301efcc6f3cf7a7354d68f09136996efd8781cc14de3228e6af639fd7803035cb5d5d1c4049fecf74e1eb779faef4c81f4c8ea3ce1ce2e0223732a8038e922528a44fb690344b917c8cd4704b783671f79e82177e3f32f41f57d (encrypted)