# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d230bdb65febbd90d6817e1fb058ad2e313110ff49dac1163c23c3d163533510
Pseudo Output
7e5a1dbabb51ff99f4469181d5dac8fc5a5ebf92f4f2fae66486b630f4536172
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b0b3d71c5011f70be2a14f3a9a43fcfae2b6e0f9398ce5b2b0608817013e1f3b
Commitment
50aa2a4f170ca7c50b85bad45576561b92bb112b83dc0f81fb4a390ef35c9904
Range Proof
672 bytes (Bulletproof)
Memo
b9e47922883030d1ae69d80cc007df756dcf99bc284f09b1f0be1d1f72dbf3f81591852ad15215a856b0dfd40055ec07b2758dc2a216f295edcbb08f821d2f168a67ddd334df0fd1908f92acbaa5e1a760d1ac0c0b47130f380af9b67153ed63e9fbc271ec4e7833ebea1e8b849ff3c75f64a3ef5fdf9ea6678485b1f060aa17 (encrypted)
Stealth Address
c05670ecafcf5cce0da1a81a863feb67a0d27ec7fb579d2171f5f904b4f57b2a
Commitment
b69ea4a6ef5c5e46c0a4d3f6f5ac943cf13b86ecfa1f3e039fe6190c16ecfb50
Range Proof
672 bytes (Bulletproof)
Memo
bb60f5515ec6a4cbcb5c281a1918962df9b95d49b717bb8acdaba715bd1da451a19d783514cb1d93f6ccd80031a1eeb8e341163bf745aa761b6c4ed2adf78608ed9aff9606699b7608416a08d58d4eb5e332f04428d0009728db49de361f46e04a96752c9f3effcba6d8717a1f4d59655c5a85ec20bb64d1af9b7a7ef4c7515b (encrypted)
Stealth Address
4688d57a8deb8df6b00404004b5adea77a2b58e788c02f29dee2ddaea0f38b5f
Commitment
1cecc85b2de8dc2d25fdc30155ecc7b5759e771063ed3c21d1f6fd02d01c3464
Range Proof
672 bytes (Bulletproof)
Memo
61972b0e2d49c87a41ae26dccd67a754b6e15b64c34c53c08541e7df9f3fad926c7e0dae2fca1f8cac650f13a515bd96eeaecc157492558108f09ed9b26f4f82dc674ea05f5ee798f6bf67d930c1abc30ac150e323ba9f2fe0796fdc9d8bf2df3a3098a7447b3ef0d93845fcbe0c321a290a298581d221fb16a2f7304ec28917 (encrypted)