# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48ba47833d9dcb209aa8bfb22af76c9eacc790a84c835215475de81c533d7b78
Pseudo Output
047f24144fc02eb799f873c20e0acc513bd468e46fd78b690efa1726c422d143
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f85bfb7f41dee158145744a03e593c9ff40160a12d2648c58e34c9bc588bfb21
Commitment
d40aa74d8f9eb36a6dd3b9351ba179771679103ddddef6094884ac2cd2a6960f
Range Proof
672 bytes (Bulletproof)
Memo
945b38f3790aaefa2145d664106ed430a772614e3f8d2759a0f946f6cefe038a452d95c48bd2f2837077385399344a5b6f7ee8da39af4ba0f34cb8f5a058bf798b2b0acd8b029bdcb290fdf2965137e4bb25af84a46a0e184d37eabfcade1e764d92a1acb52c6634c261d3816df4331fda5914e61036669b0e10ef13fffe7c4a (encrypted)
Stealth Address
9ac681c5aec4f031c3cd28b22a96ae0778c9cfea43471135954fcf154aa95831
Commitment
def2668be3bb7a7b66a87891fc0950e51ef24de8b956f1eaee3c5d1ece5ebd0c
Range Proof
672 bytes (Bulletproof)
Memo
0e04b15f3bf817cdd7b426ae2fde552fd27bae2a659dbb1ee83d65f1d903fc530bdbe070312c33047d68d089de6adf4f25e41dd8b8200a685de53b967104b60c0e1519ce054f1aa8e4c637f243523e76baf337055a8d8549b9629e7874509fa3cf3f3d4dce3facc2a3650a91f29b19a339f6a61f1a85ce50688edb461d059704 (encrypted)
Stealth Address
6a66e8d999fe8b91e05da14092c147821b7b131cfe058d89f879606822183b5c
Commitment
1606b440d13d8d1cec9223a9cc37673d670e842c8122ca52021486a6e0c02025
Range Proof
672 bytes (Bulletproof)
Memo
6fcb0532456f85e6a2a3613ea1fcdd27445da7ca811963d53f30ad4c582098dbe548ce5fb90f0bae34363ad8e4b6a8758499f8a2e7f0996bb6198748762cee08502689fdebdd8139b427f7b65bd957a6d359ae56ae3715731b732de6149cd43cee59a711b095e2328046c31005090a0940e93c7d562b64454044f132c9a45cd6 (encrypted)