# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d2f61e271821dd69529c2130011150e7bcd5a0217200e6cbdccaf56bd303303c
Pseudo Output
50123fb97284211613a0942b8d1b0fd4ab4e1a48bc727edbf0de5c5b598fd83b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f2a5f3d678884b1f2ae823de8786d1c1e471f75d71e403d936c9dfb81046e76f
Commitment
4eecc650fe456f974fb50650402a90403bc80e04aab26efc1d6c40782d8e8151
Range Proof
672 bytes (Bulletproof)
Memo
6b8e2176fd38da230026c08a0f437952ccea1570d9155b16b942ceeb0c895a3f104674cda1c442673ccec86f7207efe0ae09f5e4570c0b75508018e6b4cf9bb9926c9a370c33cf0a57c801a74cf9d6821154f335d48a5204c500b4599b500be48d4203ba4405f55ad1b68afefea283edb342d68edd8bfbe3c5b7168a9d0fa006 (encrypted)
Stealth Address
386fc85462a14395a7d71f7fbc0f3074b1082515fd4a3dc64d1497d9334b547f
Commitment
5617a2d3be84469a05bf3664ee2665558cc96886c40965c0025160258a6f814a
Range Proof
672 bytes (Bulletproof)
Memo
1c8babdcf5bb6dad6e85bb97683d7f018dc8f3bd1a51fd1bc36e5151a78387c2a3116759bf927b91d560cdd617ce2ea4f7192ad81abfdb6ed4cb6f54f314d2268644d2802d27e44b44246ecfd4155495ff70525f5f22451e1ffbc444dc52c88b344056b8a53567dc07906cae39c76a40bd90cd7e1a4e9dd19e8d2b1d2eb3755a (encrypted)
Stealth Address
b86f1aac5cd2353ceec67d7b0619f914f929b0dfd1406751f72105204b052f31
Commitment
cafef7d05acaf705f538c4021e71208f7c977daf2a95edf610349f9f8dfaab75
Range Proof
672 bytes (Bulletproof)
Memo
055050874eeedab05b0231895a41afa6650974c8a81928864c504913607f5598eac54f3181e2849aead5fffd8f17060b19a97f904e67f6d1652f9a51c0c348d8fe7780bafdee8e6638663cf43766ff725754ba40e961ed81c829ba4a552ee89989841fdc15ea0822e6d77b95e93a4472b746585934d7f9f8047a294131c12757 (encrypted)