# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5edb1745e300ed113e59a618a14e52ea94f85059103caa528f9ab957d51cc653
Pseudo Output
aeb4a2f14acf2895247af69a9e07d48c7e0f640559b3ce0c1b9f50d95ea9ed4a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dcf64b3200162821d8e3ce4252e240a5ecb6fede04cbf6a959aa20b29cbbaa58
Commitment
20a0f78c783c48cee84470589893e3d6c0f9dc543f9f6dc65b30bb64722cb326
Range Proof
672 bytes (Bulletproof)
Memo
4a8a92777677d00733cb0954ec2a7408ab4ad7b2cf26f2ea7071811b9fb45f2dedb66955b6c389e1746ffa08604a18a479900a6dd90e90ccf727da5338b318fa3caa702285f8e51a27b92e3c1385da1af256162111925d659042cfc5a94e4f84b4fa0b6482a935ddea181b0fbebf6a4425345ccd563b118c7a7c6e87adad168c (encrypted)
Stealth Address
cc0c40d20ef2d712de2d8b71e7a131501d64b9c428fd1ed2040d594d26286020
Commitment
201ae809340b6cf5b3913bb02d117f588542a0089ca095c7bcbe0525692a250a
Range Proof
672 bytes (Bulletproof)
Memo
2c6d7653b0f7cdcb5834fc00db4a9f4f8bbdf54bbbb3bfc074a7af3c19d9efc7cedad29b19eb146e016673b6d8fe1aff481c2956bc72b3a7d632a1b293c8e2d5ff9d26ad3c87e90f52d97d0ab45e80d9b8c433937ff62e27269f3b9af12acfc3a1cbacc412d0e8086b011a1e4726adb23d75d56858b1f098ab896c1d28ca3bd3 (encrypted)
Stealth Address
b458049f0445e0e5bb465b2a700dad002f48f427faef92c4a286cc515bfc265b
Commitment
b0f023bdd47e67fe4473938c21f7096396bea27fa1f4a40b0af1ad3d09e1a442
Range Proof
672 bytes (Bulletproof)
Memo
24b614889332968b6b716d83cfeef22c0b846c0f5aa4529ebebbfd83e25861b4e33132ff18b9c3e1c27cfe3d436a69c01278df675eaf08f29e359966212dcbd6b588ae6045eee8f1893b2632d9449bfd414c587c0e9b6b5ec366ebd704a6414297784367eeb69a33faa40c06ef67ccba7adfb3d426d2c440f8865e824c60d648 (encrypted)