# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08faf0aa238b5ea8a243d768e22640a24140563ed65838a8d17660e946c76605
Pseudo Output
c4be13be2f61d87478caa442515aac57f7f2d47095fbeaf233520d8db15e5965
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
beefa194679cc19ae95d066bed667d523de7c151ac23c7273ed27e57a4af5134
Commitment
36ca56607fee8a52fd1d941b180e672d3cdac7cdbb0345c48c08365782c95148
Range Proof
672 bytes (Bulletproof)
Memo
a143c1ae4214f0de873ac12ff07653f5b39e093ceb0e0d2d544b89d8a0fbaf45b34b978135df52fc0f923e439c1499efab279ff07f695a080619bc061de587813bf9fdf1bd0eaab6b061c3029393319256b6c85187fc4ec34b8fa9053850569c762be46ded58d322669caccd8a97f08b26d41153d56e29229a48968c88683b1a (encrypted)
Stealth Address
2414b11dd218cadd140b21a6648abf9a5bac3ec6c49c2f75a11f4b2ae3b7001a
Commitment
6e6a0902ae8e4c8b0366509e5e02586bd571c6ae6ea21c0a744ee5bb10f5433b
Range Proof
672 bytes (Bulletproof)
Memo
c734363d3260f48f15f290b701dbc3f91417605dfba970b7d97c27885d28ab809271a8e854aeaa880fe7e178b3f51a39129011802c0794202994187d9dfc9e790e347bd51902c1c86b31e31ebe08161e18045e390a07cc342011bcf837d901097bdf25b21eb97ff1aa0e4d852dbe1a177fbe42ba7dbd59211f0a0fffb6a2411d (encrypted)
Stealth Address
a422c58f9601e5336efd7be0fbc16b814e67c8e3d6b878e3dd617d29e1438b15
Commitment
dc6b3d67f48e2655c719565568c7d346908f83170515fbac0221c5fbfba3bc61
Range Proof
672 bytes (Bulletproof)
Memo
c2ee94d938ce5116d827a07f8c29610c9c996b44ec3f873d4fb96124bcd12e7fdd41f1d0b2a21ef6ba84e4267ff075b1bc04b9f7ae90f28df5527de58f80836b4216d8ea7cbb54ff2f90f73e92e875e7fc370ba04a8e85216594f1afc23b7b3e6de3dcd9f7eaa213ace107cdc4f22484c218b78fa1d6776d7497c6c823a2ab83 (encrypted)