# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b298f36093e9976cb4bd6595508861d22eb7160c13554e420c6d8a4e487fa603
Pseudo Output
f651779b906d1acfb303229f182213eea311f3895c44271da0a65f5b410f9038
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f0f8769f904a4febb6febb43e4a4f391775d309586fd62fa8c557f1ab82d4f5c
Commitment
2407a778bf0662824e28bb0d67d30ff561e74e158926439664db05497f0f9732
Range Proof
672 bytes (Bulletproof)
Memo
42a6fa32a1f3113d40ab014076098d1062f779dde081473e5acb9e12a68c5921d2a8d7838fa7db6c497973590aab195b4126fae5eaf4bf8fd71a3ef92bca435fbf614751cecd7f21e68af8d8f92a17c010cda3515626102799a3304813c40dac8f2e2900605408c7ef78fbf7628e63e5535f5ac1c85cd8763dc9d6eb1ee621c6 (encrypted)
Stealth Address
aa0569877e17a0e991ab694eb83d5bcbba7cfe4e40e2805c90708d12d035b27a
Commitment
de13d2cd6bdcafac39aa3bbd0915ba681ba9c434675f479233b8a7bc3d159512
Range Proof
672 bytes (Bulletproof)
Memo
7dfcff2059445282fea4c811e39d047bc9d3e34f39a4d06ffdbc51f52082f83542cddaf19c81839ec3c05e585d2ec1bfe00cc99ff41d8bd3fd3b2228cd09f6db3ab4747a0b55952cadcfbe6d54b7b8e1fc26aea458d1c1991fab87d3300c28835bafbe0abf141ececc02fd7972697dad4fa1e0423ad43fa16e2ab5ed57feb7c9 (encrypted)
Stealth Address
74662d799785b9053f783700742df7f26907baa2255b33ab7fee4a69a9f02b4f
Commitment
2e0cd6254c8ea0250ffa80c97d4e2eb9c0d7a4351e52d9634d6e60dfa1a87f52
Range Proof
672 bytes (Bulletproof)
Memo
e17ea98da9473a582b2ea92b3b51bb4ef8bc02648efda20fce1c06bfef5916ad7616e6b2fddd7ee6b2d23f390711d8577f93e327684742f3bb237aebc269864fec77e60685178fbac3988a92160a2fa41f2e32f316efa992928b7f84e8711706314e02e521035afb92626effb30fcf780d37d1ca94c5d338790ec80484b60653 (encrypted)