# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bca46412578e10cb43de9273424f3989faebaf7b7661260d7a9520056d142c4f
Pseudo Output
d860fcd45b904ddbb30ad44d7ee6f7edf248c6559247f482b955a46fa09d1b11
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6289e8e86619b46df6f526cd4d1e7e266259d0bc99cfb59e383401f993ff5d51
Commitment
70a8d9266866b852dfbb0451634abb77a107397282e49df3a86551a7e70b5c5d
Range Proof
672 bytes (Bulletproof)
Memo
6a35b4787515f339d873d851da39434dbdecc160c314ed25536db95f163c4be90c0b66ab821ab2aff144c0c7b5de2c5158adf619c55d35ec89a1dc8095a69c3882c4a81a4641c3c8f3953c70659964083f7ce3146acf41be54177fb630ef2530d453a41a738d902ae17619cab3a3425eba9d2995019b1b2dc9c344c584f2b644 (encrypted)
Stealth Address
248ef5af9da5e4c5152456932f3a6f3fad656e35bfca3260bcc563b274158e78
Commitment
beb140db6b290af30ac49433477ae17cb9a9cbdeaa7195986ee89d702b09ef19
Range Proof
672 bytes (Bulletproof)
Memo
ad21f965ff354df433a2bad831465f42fc54d4dd8420c250ed59d1d2c29b3a5b4e16c20e706e5c696fb7ca24ecc866af44f72d6b0bc92e88e61aa33a72cf7fd4de2c18976007b3bd684c241a6080f7652e07cd16ca897dc2a43047316a566f3b7bacf5e0eb511e76e71b3420951ed9e1059f70b599f5690754169d475b0d904b (encrypted)
Stealth Address
aec2387bc9fcf9e4ee12052f88f6dc382192aaa125145ca2241fe3e718517068
Commitment
aaf50c1de7b66b2290aad973b44f2929e7e5f3100450e3a331f7ecd90fffb41d
Range Proof
672 bytes (Bulletproof)
Memo
fb5691054e2411ebeec081da8638c6cf6ebed2d372c0df5986914898b8b240eea72449398e70d9bb161f942dc9057a6d8b723564c30d92f47c0d04c5b7cec1cd2a8e41633b1df5801d31e50c5fa7756d56ea803d958367763284d9d0146917840ba3edff1622b76d3580ce8757077870e99b083aa79d34094bc8e2f677579018 (encrypted)