# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a87d0763ff575bad92c99e22a470239a9dad1e729bd9d63a4da4730a71392a06
Pseudo Output
bce159f93d3db19bcce1e524cb06e6526895963400aad8fdd37d5c432ba8490a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a417d51b3c5eb724e93af331c16d897aad13d5f24004409502f07b06e819841e
Commitment
465a94afd9b5553720b4d1c994e3c0b5fb5d1f50293cbea27b22fd1311684f4a
Range Proof
672 bytes (Bulletproof)
Memo
c505be91093a4fcdefd6581bd8abd5c2cf1c28dc53f10dc92b6930a3c4e721682c2fc869f45d9b56edd6c55fb2e50fe5d6281981b488e52b6ab200b018d47de4efbe87c05eca0a288ddef77c5a0a5586115f8dfaaa533f3a59c4f40a4958e5cab62cdf61557652ce4c1aa68aa29fef718a59f4885d50e9ce25ae56e70982bc36 (encrypted)
Stealth Address
f0ffe224c2a076fa35919ec0c459a60b3ee86d1d9217799736a78f37bed46b2e
Commitment
b8014df477f3c63117aa75fe16f7c856d8aa4d8f271b9288062e40b6c2618b2b
Range Proof
672 bytes (Bulletproof)
Memo
ff0eb62461ed2cf861424a37d46e0a3967fc5f2b0f38500a8779971975ad8c474ac72d0ed367e2d1c675d164bbc8d0ca1ae4561b6e3c6168537448d251db91d190b4600f38f9b870bb51de8ef99d280f76b55915082ccb45929954cb167d3ec48322c0eced2c7842d7de8943263c89be4dc45d0cdac641e7de52e48859dd4861 (encrypted)
Stealth Address
928bd2ede817f671cc2be0a717753e509f9f30fe919aec30ad0eda71f1e68a4b
Commitment
9a4be06edb0c1656b30c7740d29fe21c544eb06a36a3e8361cc93ac4108d5a34
Range Proof
672 bytes (Bulletproof)
Memo
2b32d65203e9e1fdf5ac91e5b74243b8c19aaab21381c0e78515b7ae85cc763b0f97893f110c2cb7794e861000ddda0b9c11e000bba9bb5d81e9acafb530df1ece393bafe60be22d0c19168f99365cd570b6c344522b454165753a3861db491a3ba836623518529d7f3687441ff9edcebad7ffcbf271dee50be26f784fe4e839 (encrypted)