# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b80788f12628a12b205d0b5769195108c1961e645ab39138cb886e5eb7775b18
Pseudo Output
4295362cc8b1172b856acd407b76d47fb47f19781ef1c1339ffda9c796cb6f57
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b66e833e460e9cff5f47a9e2d2e2970467c4aeadb2add1443badc59bf282b209
Commitment
9a7675426f449aada77cc8fb0cea0e9f2aa46f345789a9b03ed4f95d8544d514
Range Proof
672 bytes (Bulletproof)
Memo
25bc89ad1f3d29e2d0bf47904fceec35bd0a87881ca4c6487806b973e204e74c03697396cbe4066c25af3d8abd550f8b991226da49da386382c8a4df469f07625e20ea0e2aab3b0e3f167fdc4bc00f154ee69ff6f1e7b4d99a809073c42ed25e063a047746a4bd4e1aa49d01c5b699ecfc4205ab9d65103ac37f46630b80bae1 (encrypted)
Stealth Address
1e55b631b6cc49174e5b69688ed9352916650880912500093aceeccbf6990c75
Commitment
1ed704075ec59ab006e9cc784d9bb064c6d4bfde17a881b66aea07b53f27700b
Range Proof
672 bytes (Bulletproof)
Memo
8eaa5c132c76311aed7fd187c3edf81b38a5e104a894ff41aa18d904963d8d872f330976b67a8adbba1472cc46eccbee50e7552f12bcb2a3b2aef4e050c1dffda725e21d92e73390c92b8cb26e0a1324e23f63e7ac47cdee28799bdbe259ca36c003d8ec28816c864ac55da004dbc304fcf86532f15a98e446c399f2034678c3 (encrypted)
Stealth Address
d4db4240137a44038b2c862a333cd43ede88ae567c482ae1e94c5cfea9482278
Commitment
e21f92f50249df4abfe9b3af2abd28c6dbb1c26a812e0e4e3fff5b225cc73c0b
Range Proof
672 bytes (Bulletproof)
Memo
d0d2fcfbf8fb9458f9944f9cb32165c16304be46dc0294b825e116dae81cfda250fcba1dda6d22d5e4ccbc7a2f8918b3eba0b328e694d04f42ce48620893f7d601b4c68e60bcdbaf7a06afb7c6f8c76f5e8e800fbcab90365f8ba9af17ece9bf7e1c0044e3b88e3641402ed061ca085d037dbf585b01167c3f00c76a399711ad (encrypted)