# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
547db44a4f653b4dd695543079528ece7b0c4af8da56a81e75757225593b842a
Pseudo Output
f0ac21fba7104347f857c279992a7fc2489ea0eda9118f0a0642446293bd2d62
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6ef0cdfb85016011e17da14b5685242ab540c236b31cb3aec55a3a055fe9ea03
Commitment
80b1fd5fc6d285ad2f5357fd2f899bda32d1a6bde27be4775efeb48beefe830a
Range Proof
672 bytes (Bulletproof)
Memo
b0b75658a0d16d96fea0bda1fc2935ecea050c6e632c0c7cdda68946f96661e6f2cf0eff75999ffd03014ff8bdcfb5681827b6dec0586f5602f5ca7368860bdd95b6cf4bcd3c0fd509cf93a189c5bf056119745ac03d5132eca5cbec69e81c92c6d8ed08451c2bea2452c492efa5dd4ab973fd87f59fe68df10062152c33f9d0 (encrypted)
Stealth Address
040bdf9a3f7bf1ecda7dc77980b522dda7d4ee7f015ed0f72bfef58bbdb70358
Commitment
0417eaff3503cf6089aa7e9b721a319d2d8231b45801bee15d0b1b50a35ca05f
Range Proof
672 bytes (Bulletproof)
Memo
3d82bd6d430d0c5e987d4de7fb58c36b433902815d5e0b9eb7278640451309ac1080bb55901aa4a61b6654ca22618acad5ad202450e3f38ef087f8fc204171f36f312381773d34ef8259803ab2803536caf53e769c1f9be63f5faeb9e0dacd861785e918817a1a40bf9cf251f823eea746ddaebcd17e09ce859c60927fe87da8 (encrypted)
Stealth Address
123f78a1d22e5198f24bff2c45bb37b6140acb42bc30f2387392db6b0fb90d36
Commitment
7aaba03b791f55225d5896dc576db8d9661b593e51c47b274726e67b9f0cae51
Range Proof
672 bytes (Bulletproof)
Memo
430492ee701fb6d7f42bb73baef22f0bba0877e919aacb7d200ffcec2849256ab7ea258d4b4ce74de3af9efc2002f2485f58ea3f669a8395dacff6511594af366870695112c97619aa8b4f829f9b6745f4aa9b407d7c1a629922f104dd855c2ddd2100445ab55f9e95f227519cab12899ded0305b1c5db7d4217b95fa70529e2 (encrypted)