# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c7f0dee5631184575e45b6d792415439a50f8c72845fa5ba18fec9633373e70
Pseudo Output
8220a77c3d42f2495c1fd772f3aa90262adec8fccf268bdcbebe0fe159d6224b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a90819a0e702e92146f739d3ff6d7a269751fcaf349257177825d608b28de3e
Commitment
e077187935b51dc277f9be15d58af837d0a7e76cebdfbf16844e27982d838b47
Range Proof
672 bytes (Bulletproof)
Memo
c5c9a70e369ea35c91eeae9cb7bb27c1740ce7715b2a6707ba11333fe4ae984404ef1e39e52bba850a8db807affe7c4d6f9b61dc654caf5b44093c4640df748e3fb73764c2d2d5167fafa998f61fe99bf732861a547da1486363fa081f6499fe79ad0ae3398372bbb4df578947927953c8e3978a3aa63770ccbd4e920ca90f61 (encrypted)
Stealth Address
d21f70e75bd672a8c6b8d02b2b073c83af486f47384ed168e72628a450f11223
Commitment
d0d28a8c77fb0ab721a96259231f356169a53963d95a78536b8aaa260c695606
Range Proof
672 bytes (Bulletproof)
Memo
4f19d14f1c3806eeebc6651c762dadcb26580fbbb32117ff2d41f8c48dc8570f17bff0a868cb02aae6c24fc041417b7db9b375a7297b27690bb2174ff3943b315f2fd910e668c4b1a0537a6bef6e77797517e18d55ac89f87812be1c23e755702ae28360a42675c5ebfef0df7cd9f677d70c8365d6ca449a1c538d1c2fce36f9 (encrypted)
Stealth Address
68c03efb831e12eed4c3a62e19558ee42860274d9699c175419bcf373fc01006
Commitment
949e0fbf93fe507d219ae5ff6eee17ebd28112c15aa8abb47f648bcc89aa0922
Range Proof
672 bytes (Bulletproof)
Memo
6394ac2a46fa473f311956adfd7f8d27f2e3f7c37246ba3800878c217bf601e96965a9628751dbbdc4b134459eb4a9140b6df46823ce6454da7e60501c4676471baa1deae98d53ee6d97c77ac3acda73d06bce187ea04e008fd28717cf09439745842f254f97b62a06e2ac4d41c7c97686e2eddc3139151dfa11409dda105dea (encrypted)