# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d48507bb249a0c24f237d6b2ff04655727f35574c37999cb235b632f562fa42c
Pseudo Output
202931ed2c86125517de567a00e3f33c2c73431179a6740bc18f2621078a297f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
089c2bf75a814282a46770cd50e7190fe16a4a7ebf7893fb8d4fe3e3a7107908
Commitment
fc24b999dc191b69e3384ea8ddb41a54d1c06abc96641da62149884927c81238
Range Proof
672 bytes (Bulletproof)
Memo
ccd0a7494b59b293c38ce344fe63ee5543ae6923cb3d313bbb57ccf9afb987e7b50367175b1c3d154f34874a0b15d9f8a2fa106bc45954e07d353cbc2251fb29628dc7ab3ac21ca5c6c6160f10cbfe2745d95050ecb00b9b3ae769d0170eeaca76b61908427475baf12a1c970181af91721a06129ac8cc2f425f0b21f1dc1429 (encrypted)
Stealth Address
c264a9e199f3bc9f3f334ae8db5804e41df0b62937f8d0c1ce18cd234f88e666
Commitment
1eb8ed689c8dcbc11cc131666ff41f911a07d3eb25ebbed59407c5f82ee75c4b
Range Proof
672 bytes (Bulletproof)
Memo
e12af6748ba52334c384c68943ed85f7f2110da6e96c0a2396201cf84b6bd46aab645436f85a539a19fdbadc3e34b9f8dd26c96d2c342b432614c034a768f17ef82266497ef0a98477070c516fbad42c3d109e50044c3b90a8dad9b2a3b17ce52005661f1a4b2afdfda4f2c844c473014339033ba70d5497e70cf51eb91bd3c6 (encrypted)
Stealth Address
226a9fb569325d3e4bfcde50aa52383fa6a4db889ba7d27fb1ef897850144543
Commitment
f848cff6ebf19666eea8b23718f0820565e7ddefd7bee025dd6d97695fcd542e
Range Proof
672 bytes (Bulletproof)
Memo
882aa4545bdb10baf2b6b48ed45ba6eef38df0545a91e43c709d08041438658cc8c071e591c177fd2a60df02d1843a86475bf9f27ac16f002081730f03d43c2b6ecf713196a74d62e6983e6422d408d4869836474da6b771774dbca23c2e579dde236acd7f17648aae6d83514de47ed58f5c26393862ef87da0cccdf8f506b25 (encrypted)