# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
34801263b0e78c408eac64951991f61065f9a3e7da06f5b8125698ccf98ce923
Pseudo Output
8a2249dc8d250ce02f54f810f2179478bfb3e59be2200025d27b76f33a007f53
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
20d857633dc060aab3e610209507db211e638fd9bab5ab5fc8dd3c94a7712147
Commitment
628700c2dd43629c0ff8f5c8de1e954257555d77f245404e9cb915d4a6267769
Range Proof
672 bytes (Bulletproof)
Memo
87d502a03763da3d7a070b91b27acfb25734af1c1cf8c1bcd5b195b1d3872b20f9dd395e11bdbec7c59224d633419c8c53678a8ac29bb3c45e9b79950b72140b50074d8cfe575985105621a6cfb8757d8a05a5017c50125ae79ec9613ede5175b0517bb315f5967bc9111c5c6aef6d46a0c0d45b5b2ba32a85429a614b6634f0 (encrypted)
Stealth Address
dc026c473f7498cc81be38c73930bd6368a92e2f5905f2af280433b4676bb059
Commitment
4a3b0c3553aaecff43ac4cb28c1172e4f6f1a79c5dffa61af0838664de1c881e
Range Proof
672 bytes (Bulletproof)
Memo
c31a809956f31e652349acbcd158517e6e4be3e9a04a99a66779f30f7b5a083b62ca18a6f627f5f2dc4c7142588f9bd3ea71e76645a0e4c69af0541cd635d69eb53b14a516166f8751846c8f630dc380bbcb6daec0d05b21ffa516e9102ddb0298d99acc8d36564c3ea0e31239cbbb16731fb42b1332640df72ce497c5b921bd (encrypted)
Stealth Address
ea95552ab7671aeebd6bd809aa7f549f9518c97673ad608d4e5738caaeeedd6c
Commitment
32bb69559cd10236770ed78740e1fed700f610eefd4896951d4d9f0c1178033c
Range Proof
672 bytes (Bulletproof)
Memo
0a633fb27198469d25ab7f5b6ff8b35b1cf5d550090e06b46df37f3c72628b8f99b04abf65509c9b71fed00a6958a4022baec4852553a0c26563a218b418a2dfe0d1cef79d8a4498c99f2bb164c106c1f2e7083630893000f7db320f9edbcb4fc784e819b9376b66fda848005e4776b74661c7219041a1cfa9a69893b9da704e (encrypted)