# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20be8d663763a2d27856cd7e6cfbeb2cced786bae1b0e653e95a84339d6cc35a
Pseudo Output
16914eba06a5eb650115fa04347171921f111fc3a8dfb32cb50346340a1c4a4c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
06d6b8a425f6ea31689fab20366ba9f24a41ebc557d72ad9b82a3baa963e975c
Commitment
4e15ec7ef2aed37f7bbe8f562859a86124e11c94044ce585c82902c876532816
Range Proof
672 bytes (Bulletproof)
Memo
bb446af46fc30a2db9796163ffb1db0a6ad640bf4436cec46d0c8dc5212dbea9762fc6e36f4cc2fff0b850521c7847f203155cf9bf08072d05943b4e27624360bf18184d7b5040402410fd87b318628e10019834b90d4a4a31715815092d1e8fad92fa85a902e11d468f09e99311ce14ae1ba7de9649d166f717f62617f91fef (encrypted)
Stealth Address
302e8e8cd4d84209454dda174ef74dbfc5aaae03c35bee52d7f8c59c5240936f
Commitment
7a7fb8fdf10dd09b8f1fb032d99058533d306fa0435aecaa670defe2ec004d27
Range Proof
672 bytes (Bulletproof)
Memo
9e166a6613c1cc6e90b7c0d5bf9df481501eb7fccd5c5ad491c33a168402cef13c84ffd516e6e24a18b4160357475f35d8ee0046569bddcb73d299c583a35c5f481a2d3811fcf8fc886fd724448c67f75340c17d05eb2b340379667486ca833456a3fd4eb60ee18241e25a699fe456e67e915c9929f664a583fc27234a15b2e6 (encrypted)
Stealth Address
b047e5305bb37542bef64c93dbfd2350b39d1c6ac06f7e8153d0f816cae24073
Commitment
a044a6a01440299959b97c57b7f7479d2e8575de210dcc3c7028fc1ae96b2645
Range Proof
672 bytes (Bulletproof)
Memo
345e9c166218f1061f247be60c59ceee03cbd242d7091a029970026704a012633f4766ce65c1fd6516b11c22ddee40339529ce6a869e8cdd12e93042d7008e1f55f92867fd377062cb11f35c75fb21dcdf943f3426d06883673a9fa231933538f3fd2845eeaea901f0bd5ddf7eb4763e5d86061e33ad06b8179ae9fa8e591ac7 (encrypted)