# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c65550b7323937b46aaea55f2636fa0340b72c540979f94cdde6bd14d1528c37
Pseudo Output
3c46429a8819db10a86f2a72ad5c784cee37e8ed60f6cb9e9608628325ae081a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b851d4bcb40d8cf23b0057b775eccc86bf06d2263529a76bb0191e181870c458
Commitment
0481a4bae84f7d1147fbd14135bdb0591bbc97428d27dc504a74ad82c55fa25d
Range Proof
672 bytes (Bulletproof)
Memo
2032c8f933083cc011f5b8d0af28d19c90f751eb3b5fab8db6ce83d773549df2f34bd18394d3e7075c29d843ce6eb82dd468080ce69e6c614170a551f58f2ee59a028df83e2d77b524f2f852602e49ca2ec1270122d63a1650ea36214d1c80d1ce519fbbeca96d77a1b4a9dd9b9b0dca4577ddcce889d8d4ddc32e80bf1a3591 (encrypted)
Stealth Address
2259c21431985a8398a2702b8147136e28aed57e8eb20e02ffd2a8a53300147d
Commitment
8a7e3a0744450e45bd26c1fece0b55f53540d960cfd84b55156978c974c90c10
Range Proof
672 bytes (Bulletproof)
Memo
adcd495f91ead345b2228abfc5a3a28790bbfab5132a14c4a98db48dfe8ae0734afec65e91e8f0382b11c625e24a245d5e1431cfc071492682da358ffe7896d1eba89b39fd05d3f438ad6e7492038cb00228b658696152ea14615e602098d859da0a85168513e9767f8cf2405aac2bb17bc3d92a4bbafc59dd8d0ba158a090ba (encrypted)
Stealth Address
804ec6098433b72a6a3019ce67b859bad0018c2af8b75efecda811ee1ac2b532
Commitment
4e47ef4d0395cbb647212a39ec29df3903b7f7fa6421ce67ab5fffcf0ef5aa26
Range Proof
672 bytes (Bulletproof)
Memo
eb219ec72cc6403f7cd7ecf299ccf7d9f04b2a596bf20880217ea2a518d2972addd536ee936bca78c644a9a30f65bfca08828423a122c84c67d58c4da96fb9849b3f249d80b5d3a5412fb2cfb1d333ea37fcdbc8a0a678fcf97daabbc365c2860ea2b424288b7f6a4628762ff600dacc664f729cb1aeaf214db82a47cd4a443d (encrypted)