# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4c3230dbc18069d953d824b555225aa8e2e978e68422de14abbfece4424ae18
Pseudo Output
06a6baec849863f9ffd6be93080e8713f3773cf342d381f39908981a5599e91e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
80e5d4f9112680310620b605ed7e99f1f2d8351ac48f322cfd88d8634f3ddd06
Commitment
3689d1a3cdea2d736968f6bb715d6a84341b6e95ae97f684f5e0e5746d6f5923
Range Proof
672 bytes (Bulletproof)
Memo
bbf81a5733a9dff28b6aff175a4368db5949810f8baa09e18b1da2a06b2d9664a9a8aee7d25d93383a72cf3d9157f908b527c37689df8cda3c42dac1512f4c7e3bdb29b1fb2b967249dbe649775cadf48a3f568165039305ef27abe3589b501fdab8d013c904101a61b29616f711e4e01d503638a019f9b423b91558e3b8b537 (encrypted)
Stealth Address
103ca29357e5a284a6d9ab3c571ed3356d1ee2b355078a536292dc5bfa47122b
Commitment
9cca6e3d8dc4b7ec400e75e53f1b87ba2c9da01c97d9f02a9fc925534be6412f
Range Proof
672 bytes (Bulletproof)
Memo
f65279874f893e8ea8641fa5e58c0171b5b90828555af2e60e203c8df66332acf407a21876a9f79032eb2d71db63df3eb6568abd1dcc75b94375f89e940838aded1980d0f974f8185a76ec4693ae916ac4232cd7d8a477e9db407c46dc15ba8423251fbeac2985613d8d75cf935fe2ad22ab641dae1af684602044d1e646501e (encrypted)
Stealth Address
cc04c02f346606bbe61f09706929e679b001ef9be9cc4c9bf722f8e82cb0486f
Commitment
84a35296cf39e707c0b0f8ce39a2e230db7deaac1b8158584d095c0064103f22
Range Proof
672 bytes (Bulletproof)
Memo
cf7abb4c514005563e010189d0ffb5c689aaadb33d4ba58ff389cc93229db9e0bba36439f67e71a74910863d8040511d692cc714c8e95027a8c698fb95e62ff17e7da38ff84ac9da36360c85689ad767e0b5316d651539bc1bd646388cad8f0893a053c36ea040b789e03f3061249e3d2ea51632768e3c1f0b02d6a914ea4237 (encrypted)