# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fccc63d9d2396af815503e483545e0f5b76f81a73c4566ed56b4422d1c166779
Pseudo Output
b004aef43e6a1e7c46bf74e20dda99ba752ed8c4b782b805d54f93c515914936
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
42f7b06ef8b661a4f1c4f06adb716e139cecc68aa0fb50d1efef0bd32cca6d08
Commitment
b206191892772840ac431cc19df56500be9b495c553ff0697ccd1ec5a7f67651
Range Proof
672 bytes (Bulletproof)
Memo
0713ed22280ee6701bfaf43a0868919935b7a76450ffceb923349a434ed7406ffad18a86bec8ce38212956d650f358d08119e054290bfd9b3c4cb77cb613ae10183ca52e6b59f965b3a8ba57c120a4446bef18924a9e72cb9ee6119dce86700427377651690ba33c064db88ac2df52ce6107b77aa62e9b8007b32d59bfed088f (encrypted)
Stealth Address
a2b0f2ec461c61d4dc0fdc383bd2a8d12bdddcab19c87ff0214b775de8824b49
Commitment
988170a1cdfae07e8d1fa97d6da9ebd79eeb71dcddebd34afd01f470ad91596b
Range Proof
672 bytes (Bulletproof)
Memo
8a208ef79a9b3898af61bdb5a10fdc8f22dbf367c1799d703ed1d1bc69b2b5ee2be101e1ae4146009baf6261d3418590235357f71b353125cb4e817b96fc830972664989f5d20e6b69b84a5909de64ceeb6b5d66c1305cd248bfa1c4ff88aac5d995ad6d29a3b2e76356be84f603cda76af96b3b88ebc945158909c15102eea8 (encrypted)
Stealth Address
f8f8457eb0f9189f5b2a873be074d72eef1c3589a1cf8315c3f214220f0fda3b
Commitment
44a4024382144d686f63d7b732c25f8e797c1ea16c71e199f123be2f78d37d39
Range Proof
672 bytes (Bulletproof)
Memo
8d62e005f335a7f40343cb7e56e8f101e4b001ebb94f06b726bed20e52c2876e6c99343bfe5837a825c96273afcd58d1d0cdcab29e2ca83e76fa1ced00804d3eda2c9185692e066589d1e36e860a4157264937ab7ced819bb4ad656c93dabb82bd4208bf003c60b75a7ffbef5f214ef7f2d31ef590d232762e1faad910af8e37 (encrypted)