# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8c5ce758accc270fc3d1f41a0d82654ef710998a4d8fc4d3d5020939825fc54f
Pseudo Output
207254fc2d77f05eba3c1f9ccfa4db97057df26ed5dbd4cbb4d363c1436a673c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b20c1236729861b5d173673500487732907252060af212109a4508b3ca04566c
Commitment
bafae40003120c63ed2e2478ec9af4edaa529a15c6b9549599c0b6b7913e6b1c
Range Proof
672 bytes (Bulletproof)
Memo
ff76945055cd6dd6bf08a6ecea8ded32686ff4662c1756a0dfa68e16fb5126b135455c95ed0cff1b08febf98bf0b302ba6294cb526d596049e7d1c3b101467f7f9042f7697eb92305b6f047495b60b8cd6b272d8536cb1c1145cfccd622c2e5c88a14e1872acab087912efb2727d94186d4632ff83d34bd78a447086da61a98b (encrypted)
Stealth Address
ecd935c4cfc5264d5009f8c3b456208edd46c8baf603b3e8cc7ca767b5387777
Commitment
c4295c3f4087888b85efe756ca67bb70c4e0fe701663cd38253769a18be75d3e
Range Proof
672 bytes (Bulletproof)
Memo
a13b2dfa20a252a45fefc6cd518b5bf3487e1ab2cca631bfa595fe8cb7056b7debac879bf43a7bc67a6540683868516dfe179f5925901fe5497a204d93dd2ad95796fb3c5c74e534044c5c266c545fca0ab47c303424a56d76e6151c392c5c131c783812b2c8f33fda27bdfbf8714745d623eabf914d1b34b6f935e05599224f (encrypted)
Stealth Address
64536dc19d8fc1876ff985570f020652406a301502b9ea929db973df14b7ad5e
Commitment
b09310a285af17182a56c4ba22a1866cac8a95bef5c507761be94e5fbaa9df31
Range Proof
672 bytes (Bulletproof)
Memo
4f1c4c4f8c4db90d08b43a3a85ebc5729663ce081d6272109bacdbdb0ff212509eab927e76ef8278d78b0638f7433318f218f4e392b5ac27816300973c2704137332e499b6604ba8548692fe5c352587faf0148316c49bd42331a711d50bb69fd61c394cde27d8d9f107863d7fe71a16b3e710d40a45299cc8167ef0c8ec56e7 (encrypted)