# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
389b72c2cd2bc1e049685290f55fa267b95c114ab196fcf92be6d9e1887b756e
Pseudo Output
58948ec29a4ccdc7d01ca1b0141c7d096c9a0c611acca4bb631827f564e8153b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
20a57c7d8138c44aed5a3e4270b9059dcdec616bb6edfe196a6807fd9eee1a5e
Commitment
28a5d127367336fe431fec6bf877cee30cfb5dc695a8b452a6dea38148d18804
Range Proof
672 bytes (Bulletproof)
Memo
bddb027530ea40b4c4e4088bced20ac163c1fbe9f56c82bad7102092cb6af29c38943c44214ae377e481b8dad528cd128480399b0f64294a0504bd44210aa81bc7ecd7e47d3840c4ff73325e94508dcd4f69a4ea65eda0e5d0ab926dc959d09fa698d5d7744b4da00676a0ffa648a68ecb1aa26e24117de127aa88d9af9b9c92 (encrypted)
Stealth Address
145020edc0b0e65003c8a05a89c8dd1399164faa96420ed1cac4c3407518893d
Commitment
7e99d14bbaf6e37fc13ee8c4bbea51637de92f38396f4f2b77407d34099b1e5a
Range Proof
672 bytes (Bulletproof)
Memo
767c83b646c1aa0a5b60a3711891555f9f1091b79885ce6117606a3b4d3a694c3495f9ae73a2fa9c1088f183d721029a47b832db4b1a45dd4b9d3904453f697b2e37a0fb3df234f743d98bd9384c1bd043329bdf1298b03a16d4c914c3cdeab1e8739a34a2840488c1f90ef97bc330ec49aa42f34351fa571faa17755909f2bc (encrypted)
Stealth Address
fa3ca1017f9491d829bdeec59f0b76a4e0f1eb19c5d7691024d063588486b079
Commitment
62579c8b36dabbf8d85e0266f173d40a6d0e1d9fb93fe7a7f51af8cae0f60403
Range Proof
672 bytes (Bulletproof)
Memo
01e01eff099d92ec0d60b698bbcff03a28dcca691ab25b280def492de9cb9f02075a4139fe7a4a26310cd3eccab323469adf54bacc2241b918e79ec9f91532b214c0c8dc317f8ef4015067edf2f8ab0151e4938be6ee4eab899095666bff5ba9a1707fb92079e2306447aa70375e0fcec1dd97ea9ad737c9179e1c2deee79f55 (encrypted)