# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aea35393a95a5e19195e2e57665028b5bc20128cf1eb5f257f07b0e45aca930b
Pseudo Output
f8c7ef6fe31d775cd41a28df3f74fd190401263d689a7e60660b31b367b89c13
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
20ccf0f2aeaf437d4f894796c68ffd9a9b0bdaab9560006a806cc7021aed5505
Commitment
6c75dd3ca827e02b565c0e5fb2c3f8dd3bcc381ba28bf29d04b4356625a1304c
Range Proof
672 bytes (Bulletproof)
Memo
3bc5b66221a1667ff6e5178e18fbb85d7f1ccfdcc72bede2eaec31fe3fa605de38c5b1b186e13ec703e728e9df471f062122146efd9d26167fb47d37a77f9072f6adc03738f5682c269c3c6337a4f1542ab32849a4630a4ff44f0afb3b19f4ffad316a9e5b6f2a35ef012b964a810b7f7224f68ed663dc65b234fb0beb23381e (encrypted)
Stealth Address
5a86ed7a72d32799d4e8a62d3696253eb8c8adb50cdc25100ad1fc6e2a9b1a08
Commitment
b89531d513d3d10216edb298cc81c1a38417f0636ae5b61e1315b58f10703c2a
Range Proof
672 bytes (Bulletproof)
Memo
88ca19a4122529633b34d0273f42acf8e10542f55c6811a1a3279b41a9c33428f4fed9956ba6b1c06352c61f67637b99406c771357234510e1f5f1ded37a9bf7cf47cda7035778ef54b14db6de548a54d847d649f868daf6abb264ddf665fcf5198d2ebc9cdfb4cebb2b62d58d7a57f0c66dd6172b14205d1591a6f9f2d9b2c7 (encrypted)
Stealth Address
4cab2e4ddb95f6f5e8e4cc844637c14c796c4112fb1721809c0057ef7ae0c274
Commitment
ae758c30da96fc2313db16296789378402f2abc50842c2aefb2349a94526e93f
Range Proof
672 bytes (Bulletproof)
Memo
fee304e2812bdb28e6d16943aeef7b2e41bbd40849cc0ce27227bf932734367329b61c7e10360c3c3ac439cdd419d1d67840e46a3bfc2fc39b60a12854ee76d2d918643bf0d3f71879a61d28fba9de868c98886ba8f9e0be2ea7944cee60d9ad4348df76c7e1540ce050b9c391112068986a467f06bfab02d9129e05af30e790 (encrypted)