# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a69ff276f055a3ac557ffdeab483f8d468612bf43337206f9c71adb2db8a542
Pseudo Output
265cd36928832d8d6c6466dc0d5c739d48e93c4e57b54d218ee326f9343ea61b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b6f69dcea024a936a201f0836fb5140faf8c2d0bf0439abdb6614825bd762d06
Commitment
2641baba60f72eb350f968b135489e362b9b471279a610703f4bdff7e3c5d736
Range Proof
672 bytes (Bulletproof)
Memo
85d5d6f0ed77b2352eeda514f6223a107504b7788d64463e4ce1c8569f50832c81fe7926bb13aac4da380455da4282e81c7334b01b20d92c7fd21d79ad86416289325ca8f652faaeeed2c014fce3096a937f5b64f0e76d49ea82d659f1bd5871916d7a96ca692fa778900879530c53af3eaeaab9b2ec011d5d4213531718b978 (encrypted)
Stealth Address
ccdb8d00ee1573c9b985b611a60d8339aabeda7eefb82005631d19a2d854986d
Commitment
9ca15a08bf8b973041a320a1b3ed264a0f32c4e8107afad8ee300c5da0e37d7c
Range Proof
672 bytes (Bulletproof)
Memo
f9fc688f77359910cf1fd3e7d52fe75ababf837350cf5851b7d9cea5242690cc6c38392a548513fec073d26cd0413265ce8669f056900d63db2320ddc18b4379c8d59fb9e5da436489d7713d3bf677037a02ad436eac60f7254ea08a324ed43006d67471b3b855dc6868912f4590e6f1aec2c439cc0db4d20089d8b99703ca74 (encrypted)
Stealth Address
8eb2bc82663b3357b84288b98f0a67f5ae64314e920c0c7e894318477de48011
Commitment
26cc6d181e74f674a1a9563b8d022644ee39bec2ab0aaab20f7727d268015353
Range Proof
672 bytes (Bulletproof)
Memo
84944402324842938f27d54266b2f591e41b61767dcb24c0aca50f4ea5e1368e932e3730f65c49b10fe6c5d932e05e5cb2f43cafa41b37bc4dbade7d6a1514dcc70c4c45cb8ac6163092a86d0fcefc70efdda8834aa8978c1e9d06eac38883eb395754f94bf3e0d091389a0c238eae6a8c419a77b5b1a2c6093d3b782065b008 (encrypted)