# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b0edcf1ac4325c598241f8096dc69f028d8a531b9e26982575be84934b036b79
Pseudo Output
505a16a19657ed523a85f63afe4ef2698bc4549cda3b787b57bf72dd0777384a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70fdd2e74cf72c3684383c8a08bb495924f240ac5a11f2392836840d344ff855
Commitment
1e341469826e9613304374f324cd5a93b32cebc960146f99416c247aeb463c46
Range Proof
672 bytes (Bulletproof)
Memo
2c6cba0da3ec32c8f126c103719bc92eeb8af316e4c7b6e20e7001edb79e1963fb318db698473db9ad21e77cd44e72cd99b72ffd94f8c242182c67994f7d43cc6939ff3a24927decd4c7b4fb2b686cc692e61528e3477602f70ef38e326c4c5877d6dd1a0e09ddd072e6978150150b6eec2279e95c399d904f8cceb33872da0a (encrypted)
Stealth Address
222129c22c7d2c8cbe3248283342412f712baa914758806128ac4ff99aa05308
Commitment
94501c30f9eb63754e1433507fa9c1cb8b7d4f2e0cc3d6857079377579abd151
Range Proof
672 bytes (Bulletproof)
Memo
c43cbec02f310607f06efbf627956dc33839cf11eb94ccb0ad3d0517efd31ef03d32ebbe8d4fcf3694d5629dcea698b1a081b6d9dc37341bb3762b1b4d9549a14bbe81b7278298b6b763db82d9311587c2d5e0d3e4042081f0a755ba963ef96155a29bf8526148e8b2718f9c17d5479f8945cf795d22da258700fb5572ee406b (encrypted)
Stealth Address
14f2d55e52ea70c6bf3772db46959b79ecfdcccf298341a2a04bb42c2370507b
Commitment
86b7d83cb063b823a833cf767aaf8ad33854d251091eb749fe8179ac98b25958
Range Proof
672 bytes (Bulletproof)
Memo
3b9e57ca2d1a264114caa498aecf93fa39d8798cd1673ec27a6fc27cf6b87612fd410498cef7b6ff3ee73b61200d78d5d29145d1399263a2534878c2a316c9dc94e5b53d22ca8be139c77ff26422f37c26ee551fcbf5611bd7176dc9684081caeb79a87942836c2a4e0799cd1eac4ff44310663d91eef179d90c574b5e061b71 (encrypted)