# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9859423b337e1a38c0826aa37fe5cad4f16659959f783b0d8d7bed57ce590516
Pseudo Output
b2e4940d1a8f5d1b37473c9edea49cbf5f87b853192dc3125c12abf8a59c2d24
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba070f14925e4c0c1d02aa73e3f990584cf2fd0aebf8012d2bace50a48d1f26f
Commitment
54cd78166102fd6ea4712b0b0896fc83dc1796df73e50187b8f39f735a65483e
Range Proof
672 bytes (Bulletproof)
Memo
70c4499bec66c9d9f3eec26a3b030283724484c79cb524e82a09a5815ccc749ad342e917f11dc38f6378ab1ff0a65fa86eaa7ba6bd8eca14c5959dc0d7c109abf7c2fe6b54ee7215b2cb66d6dceed0cbd87c5a58735b8463e473d174aa3e995f6066f9875abe2175a9254b9cdee9a9733c60bae61d441b17fa32e6f672863575 (encrypted)
Stealth Address
0e0361c2157eec6a25338382919f3d6b6cd0a3018c35d8eb9ead9d4eeb73800e
Commitment
f6f2498dc10a99eef3742774046c1a292410123532d8b1d330d157367af8fd7a
Range Proof
672 bytes (Bulletproof)
Memo
ee89303037cb61c255c9890769aba8ee1a5974a1080b182af94892a14cf1b7ec6a75ad70389dc2fa2bc02383c75e66846c0b08852dd055a7bd1540db32c0e1716327c8cf007d4b397adb3cddb040f6ff02b2945675400d9f2aadae55860b3d9ca64c65c7c36d567b964f4ad21d0b73e3ea6f03b4c0ee001ade471bfc27a0749b (encrypted)
Stealth Address
aebce7b88e9926e1c8d008a4a7ef5b06306a97db521f8df6814826378081a052
Commitment
80433dd4d237823e9fc3a5d3f04d0e59d7af3f16ae378c75612290cb84ca1076
Range Proof
672 bytes (Bulletproof)
Memo
35211e8f29464202e1ab72a990e31a68b79dc2dc8bcab07fcf89a49d794a01abdac6dc8c218252146a0c68337db8334010b75d47d608ac34b0f22150b40e97950e5ae7347b1ad055735dfdee758bc4b80a0b2ed178b91bacb0b4243fa10078aee95704ce1db95d5e562b3ec307d7d21337dafa754351c65264978d56654f211c (encrypted)