# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
86f3e119acd749c2f6575dfff0ba1c225bd811f40b555865b8941326a7268c6b
Pseudo Output
1276ce5330e17881da0dbf2d0f3edf280f81323215f6e96bfe2a33c2d99bc40b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9ee21a767b7698605bf03db9c6071bad143624f1913b735a6d1fe0decb8aa66d
Commitment
e40aca256ba738eaf829bc96f98d59d01cc524e5eb3584ef7da9dd6e3726287a
Range Proof
672 bytes (Bulletproof)
Memo
bf28c8a7ea880c8798092ad68ca5ba0f7e2ca4639c9cb7135d8e68146722b2c252569f2284846a02dcf1fef36aba6d4590a42582ae7d5bf601cfab0e36431cbbd423a3b1f4b97b9cbe262006cc2f328a35cf4714e86602738d8ab9200385a9a56c576c351404cd3c184a5ad17c3f1fc262b7da8f5fc850d8c010cb276edd803a (encrypted)
Stealth Address
20cdacc384654f8f3cede19d2c2f87a72daff77395b5a53758d6670fd0962d59
Commitment
466eaa2af183713ed338ff732191175a87481cc18defd11d811b43f300a1fa3b
Range Proof
672 bytes (Bulletproof)
Memo
62378297495e2fe458485adf018aa7fb2eff99e55dd6977ab76e3397de1d1e1c47b52d1c08890bc7e8f8a73fe5637a428770580a15af099a55928851f3644470f145c85de459f0afdd5c212d3a3ac37e2fa8400bfbe2892df79102936395148354f7526627bed6ac6740383edbda0c354253393cd83748ba2fecf4b180a2fef0 (encrypted)
Stealth Address
18f00e1d6343ec8adfd4c2ca99b45ef9593bb0c03cf8fe2ae0c3db143a61e935
Commitment
be14c306502e05f7326ced28bdbccd63b521ca74c8efe8ae7d223caa48d83c28
Range Proof
672 bytes (Bulletproof)
Memo
1ec138f07d8aaa02d599daf767fc696ccce7f009f39731a6c4cc263959ce6b0126a57c9056854cae14fc375ea270026ceacbdaa516bb60c5a88e2ca5059ac60ec0f3f13fecb58e17156fd09b37d1f7610e3130c3575397566c3a7cd00aeb05817207392bdcfe1463b87dcc04d0f1a98efe0d7b5deecdaa4a5ba564f22b377f06 (encrypted)