# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
64df7f9d139b6165879585e1a80882b82192d97d406c4cc5cdd3eb2660e6cc0b
Pseudo Output
886eed7eec16bf58f63bc474fbe9f578694d7d05655175d5846d1ee82f895921
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
20676fe0b20b7ca7a7f751621b4be805ad260464e2cea6879a84a2e6ef436400
Commitment
a69f2ca7803d722a047a8443060166b5eaa3db328c178b4b8d3ba02903553359
Range Proof
672 bytes (Bulletproof)
Memo
cc8f2104cd4c6a1024f2467d48f5da8f4379066abac5d8c364cba69d801cbbd5740a778208c2c5539ad9465d97afa68b8fac3b259facfd330c112c250e6664e411f6e179a46e5d42e2457f389f22f2e555a60e2c9d90275133a437eb56e0f38a5e50d51f54d04707f84f47d386883e8debb47793bcae0d76a4086d04e8bcaf2a (encrypted)
Stealth Address
b8799961fccddeb5402a38cdd6758566a354c14a42927b21f34b73337b078f7c
Commitment
ccbcc67bfbee32f959aff1c7cfc540afec245afa4db915dd71484ee622fd0a19
Range Proof
672 bytes (Bulletproof)
Memo
cf9f8a0bd862ce82daf4672fa8dd255de0ec363e27785d067815a4a78c828b960ab09ff0379e3f73b8b43f89011540697d7ab743164620f48dfe650da802bac459a19dd363398a27cac6129b8489617041c13bff90ed3f12a3c0b4fe936d29b438064d3827180d10138b88040984463019c2d630b0f5d5f978428597d88acb4a (encrypted)
Stealth Address
4e529616eb162d059cbc32e29feec062dc98d0fb4fcf034ae9fdb670ec0e1e50
Commitment
941339fa5e268f1a778aea3c7e8637914516808838ae0b806f375c6e749d037a
Range Proof
672 bytes (Bulletproof)
Memo
4d6d39f024f089ece121ff1cab5bd8f4e5847251ca9fd3bed90205b563a56fa27cb6a7c05235f38a3334915b1269cf2c6ef903462d1808c5ecf79d611f420f5b52e4539ce9284663e6b9160ad38baf5d680f80bec35f5a21c66f79933bd42bde798217ac761893f7317559206bafc793c83eb27d7307af32dd79265b797f8f2f (encrypted)