# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b2609066a2ed4825a9f59e29f887739764f3646d0077230400c69027f5cf0449
Pseudo Output
2e8732a5a53de202479181227c3cf5685631de720e4891f45013e3ac8668cc0f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b4bbc107b99a1bad7b1b33223117cc83dfd4d4012c6d10bdd2e13466df157451
Commitment
9267078e88af1f7ea4e59ca4a3d32a54601f64b52e7b9cbfebae1e44513d4b50
Range Proof
672 bytes (Bulletproof)
Memo
328aa2420aa2ebd79898746e93c24a59b58c3de0a91492c3af53b096efe8f848f9e63dfd6a1eb0a04268d059d4c137287d96bbe9ec4ad203d521fb7be6d25bb015857df18ac4a0c95f961a225323cbd0b844367b73c804c711b0d2bcf739ad762d496cca55218507a83837bb38b11c1a1ddb64cf3e0902c119f6d6baf9829c50 (encrypted)
Stealth Address
c4e227a147fdc99761a3e7e481d62ee80c8057b285d1be927bcb200ccde51f39
Commitment
bc0d08d7144c10d41801bba6bdc05debb9701ffbf5528e01d9abbfe518c64779
Range Proof
672 bytes (Bulletproof)
Memo
dc8dffaacce5464c8adcdf17820c48bd487a5bfa21abf3e5533b4e832e86fc0804f1d4083e6cb0cc8b5c746d9355539e9f1f95d2ae945e30bb173dc5a4b824cb8d1201228221ffae7c08e280b1829d997639a301288abf72b83c36ab5c45edeeb49a72219837085eb8c2367789c6d77e0d5dcea66b5a803312647bbc8853983b (encrypted)
Stealth Address
1c0c55087830bfda5deeef75bf4bac08b5b904f8169fff883e56e25f8732b27c
Commitment
9090c04f38610adf7fcabff3f0fca40e5b5ba58b80640e93178a552d05144d3f
Range Proof
672 bytes (Bulletproof)
Memo
b31a10f25234d5629b564a5514514455d4f5defbd991f02f662628a4f68c9055322924b4ab2aad7065fb5335118b92a986ca9614a0e2193d238d0b0bbbede9bc8f04910774bcfff01e82ca6cdb35da0df239bfb364ad1f1065e8620aea731963abbd45c5ca977466542e3cb49ee67094d8e90eb27f1077cf24cbca54c21074be (encrypted)