# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f4d203a4bab8a6f6939ab4cb6341e0fd210011aaf737e2249394f4e013c97358
Pseudo Output
80ac735b6dc2081bcc505105f87ed82db839f0676198474767812ce4360b0953
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
20daa87b978a5890403f93eadfbcd7725570e587f579a6e820d579e753c5b958
Commitment
3ae48b302e9fcbee3252278d855e601be299ae104c190681b620b2fe6f614e20
Range Proof
672 bytes (Bulletproof)
Memo
e63501c683e6846e7743485e7ddd00c4d0a08433216251095e870e52e1bac34d17e73f7f7173b32f13bb981032e96baf156431cbc08f036fe897481287eb2cc24fa1f16b88191b3ab2794f6472f548076ea7e14c2cc85f9bf0994768c0fc833c04260a6ddf8af031a313705fe9eb6cf2dd7b8010dd26df3733d7b7accf52e1d3 (encrypted)
Stealth Address
a06325d7bf370df2c500bffd58fb06867cc19d1644aa35db57515fe0949c5f3d
Commitment
ba795021e1d7f4abe052082de22c46af84d585d7e5bd16b9c0ecbe10da93783b
Range Proof
672 bytes (Bulletproof)
Memo
dbbc1145a65f2943fc188ee629edba672cd727194fd4e17f903c88b0e15622bca41dc274f5477e22a08be3fbc86c8b0b9ad4d99e54ab2db30a26c4c6b6a5e39135ce659ba65d395b88c5cb620b43fa228eec8f2a111cc422972789e9d78de922d096c27c9e2de6b7a29d8d31bcd0a8219fc468ad03d0f0237ca526d7f703b4d9 (encrypted)
Stealth Address
bee525bf12b455956d20207eb8da12aab37f979fb2876df0f914cda12f5de450
Commitment
68734678e38bc38c5a23c24a7dc19bc3ece167aea6522ad95962a04c41e4f238
Range Proof
672 bytes (Bulletproof)
Memo
833fef98ff08b87b3c02190d2486aa1c32ac55d2ce533a5e89c7e3b85fb4d4f2c1f0a5fe86c2aea01495d7fc8f653467b386fc5757d8a1c3282795221765e1c50f169d8bae39cd1134edfad3dc91212ed3b3f74bde3838a8c67c40f1ff0de6a1488d1edd93aa9ebff38e460c78d0c9b0da662dd33ccaecfc3013caca8de16f68 (encrypted)