# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
920e74e69f9842d3c8f037bc7e4786524330cd0c4470d79331e97320af0af545
Pseudo Output
40af22dbcb2103eae3c00b8859434f6688da4530326ed8a575d21f40e2076340
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bc03f80006b66ab237a24771d4615ce1edf4b3d02c98245e5ffd78a35a537c14
Commitment
10926661fc63162fe497042c9ed1afaeeb1847eec4eac6869ecfae0fee5b3250
Range Proof
672 bytes (Bulletproof)
Memo
86794c3db70dacca384c00ce72023e6a97602ba70ee10275c36bc6626ae00f6cdf2a462f7b7506f20d18c76a0d7a52647f28dfaa8a95f464c6820bd144dc6871fc2418cc606cbee7cfaad2d2484f9c4e07b6087ff13fcd3cb46c059bcef7fe595850eaf87ddfa26a28c28c9bd7d59b81ef21ed0f60cce610b08e7a3de4a8803f (encrypted)
Stealth Address
743384f79521c80eb9fa0d21071af24f4b2f91b0135e5072e4707e0e91facc7a
Commitment
a64401a6ed983614dedc0ba8ab2f2e6016b3545b9455023fe5be2316dce0ce3f
Range Proof
672 bytes (Bulletproof)
Memo
4c527d3c8b171b4ed26c78d7248b026a46c9de03f1cefba44678a40aa36079709e34a02ddccce4ec5e458d931724ea9f997c653b3f8ad28cb3af177730324493665fbaa10f6a30ff2ac8f041d494907473a9c6485b8b7d61d738c36d9583a6ce1c3ef2edda08da496533b465a351ff45ae2ab6245e47363ea4023aaef8f5f1d5 (encrypted)
Stealth Address
0c2d324b49b5f1a11b2ffd3d6d6ac44b0c2880515031a44f41c5e11bb38e226f
Commitment
a0eac1cd86ef6d05778fa11564331542de82325cc5dbc464be033a1bcc071d75
Range Proof
672 bytes (Bulletproof)
Memo
1118de31ebed9bdbe71be7096a3c81d8c3fe46a9dc21fe4c6554bd18782367fe69a895403a0d1d4afc5ca31ccf6b6283356d3bcc6ee56ec8be8d9d21f5cdef8af9a0b725a031bcdb687ce061b5b3e79a411bcbd7f3c28c3960402c495cdd950b6cb8274d3654b6f4f896ed4fc872f0d5413b987183fb6f52b2842b4e0eeb681d (encrypted)