# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc69923574f65f0d950838836617716baea0cf2d3de0db8f4d09e2165d049c28
Pseudo Output
e0d16baecf67717873b429e0056ac988e5f0f95188f1bc50dc7fc72f03975b1b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6ac66a74d3e91f884360350a46ba25da4c44b8e208cb9b85eaf04feb8f86012
Commitment
147e86f208f32eb5c81b497108dc6513dd9e34eddef4cd33a0c74a4732f50d20
Range Proof
672 bytes (Bulletproof)
Memo
49825e9d557e58354176c10bf970bd62b473b8fa00d697f1e043fe5b24a0280caf6be544cd3178a434649a53b96768125fa89c320c4c36d9b6dea604ead250324820228c79a06cacf7e05eefab5688ef3f9e3a7d387b7fc128504909de83118d132f77b2efbe2f8996ab157ae9b602e54e39bb470da8d9bf949602477d22a733 (encrypted)
Stealth Address
fc75dea2e04d64d544a3fd435a8372a3430be747d2231a4ffa6845e7ac91442d
Commitment
50a863852ee9d42e9204d69c12a176439454fff4395dc93c6aad08f56f545a6a
Range Proof
672 bytes (Bulletproof)
Memo
e81faaf56512f348f0caa038861ce6f7b6576a732942e15b4080efb6409d2b64c2d47bc1ffa528a41cb2151c57876f918e0d9da03d47a3c53b16fa3515bdae1e412fbe7566098218d9d372be24b6bb1f26946ce4eff443502f676e23950578a27ad046df5eed9d3b67111419eb6b45250e9d519ab500210173231961535db209 (encrypted)
Stealth Address
263c53178b157f4b3346fe0c96f3978fff3511e2537fdffe7c8822868746de56
Commitment
46857828af3f6ed9fab11249dcefa5c6a0a54e403e4ae84eae2ad221d97b006c
Range Proof
672 bytes (Bulletproof)
Memo
1baba98caee9ab2a76a2eef4e9732b2cb0a3d2000483458e4de6049a9cba23feaea1850d7457cfba566e7d2b87b3ce4b00398b3a111cbd4269eeb2e9f9f57d9368070382eb313e7f49213159ea6d2184e87cd3cd5cf8669c2215093d5470cd26a2095f7b950566194cd38586a10068506934ecb96a5c6783b1fe38e2d3e6d750 (encrypted)