# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e62de29a4ee663d27140183211863d9b8cd0b10448e0ff899b17c23150fb1c01
Pseudo Output
c6a2187e60a9182ad5c14a34f47ac4d4e018f211f2f72998ca99d846fb25c014
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b8c9fbbe490fd8919f41ef12939721fadc449d420e78fee65059d5b4b7ce6b5a
Commitment
200ea1334dc683c880874a9a45b227b8697a2cea609a59ef1c70676b6c238a62
Range Proof
672 bytes (Bulletproof)
Memo
52d2855b974258f7b48c3970d106d9c5c6f67d05bd4f974e69b23e4c18de5bc64e9f1b9412fafb386bed36d0c7a351148319995e810fd40ee10fff7985b161af866ff37438e67a7744f48319e32e4eccfb59823e41c280e11298301f57cc1418179d1b4e1896a49e971ddf9682bb13d2166c0d1e7c50353002137cd43e1de5f5 (encrypted)
Stealth Address
6ebbeb8282f86c95b1b4f2980b2dfade77b8149acd7fe59098589bd6478ce657
Commitment
8a5259348376846e190a587eebf3dbeedab22d84937f2acb8ba6a602e1ad1950
Range Proof
672 bytes (Bulletproof)
Memo
98718f6f228dc4c8e3a6627df95b3f5c74e207f8d38a6ffea2c9db91344df56ca98e5db0229084332c217fb3039957221e35b2695849f2c43e61d47ce270e473a157c534e109861a22af6d66ea7a9f16dda3de686cbf1b16511023090d1929320a37e5445ed7d85bd35818582d77f1f6f832b6e181fae00256dca42c00603239 (encrypted)
Stealth Address
32d319af39472c66e1b8667ae1d312bba76be87e746d8c10a91379c6ab8a2960
Commitment
cefa9f23f8bf1d0ea902c895ec45bb70611c649e3218d6fe070aa547ba5d6104
Range Proof
672 bytes (Bulletproof)
Memo
6fcaa26920389c7447d92b5dca7bd6ddf6baabd8112b4ac24ca059de9d8353c79cd5e35b58a8d9454e9ad32697a50cdf128ba177667cb63d0ffdde22c63b91577540771f53eb5b7f324372c7218653efc53ec0304b2884e79d9590e9d3231072f67dc345f400bf4b1173e843554cc39c90b5c19054937dd2d9b7e12a89300013 (encrypted)