# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66fe9a74303e21fc9aeb48b3c883bd0e652c3e39ba64a99fa91c5075104d0410
Pseudo Output
5ea054d068444024d8dac0b9407a485f8091ac97e1292e756846c884c906585a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
201e67a447e653e13ed75207a6a77aaeb264bfa452af78a64497d5ba5da7a51e
Commitment
8e486d4256ff6da2a3c803bdd3bfab535a3f886fd8b754e9b1eac5eff12c1e63
Range Proof
672 bytes (Bulletproof)
Memo
79c83d904526fd05c73771a286d2fc7a3901364979faea3b90f6c7c2c0aebba0064e2150587364a27533dd85e80439c7dc376498ab49472de77f15e5b80ca0d8eb44f2ab9426c2c9ea3f4dc275d384bff4ed11387462d635632eaf51717f29ac7a16849c19124fdefc42ade57a1b464cb63c5a4697b89323c3ed5b3dd772f0c1 (encrypted)
Stealth Address
7eb80efc38a86882c99258274bdd9eb299d3401fff0edbc7e7a6cc3d0d0e7b7c
Commitment
9a4618504959753e6d4d7fb0c811ee6607deea57862bd38d773d7194ae21e42f
Range Proof
672 bytes (Bulletproof)
Memo
d3bdb0bccf9a04fd891a97b1ae739a0d580db3f2dfce2f7e6a225c6878924b82cade16d0284334b9aed24a80e8b733d3a8f47fa2a0e1b9a902327627f702167da95ccab7f2f43d4a1c2bbd62c09969cb61fc51dffaf7d0f5b9238d872f2379e67827f66d4a3c1a84d2db2e829e1b72fd71ee1edf9adfdeeaf78fb7d55bb7fd7a (encrypted)
Stealth Address
120a8b15d360fa79f083423ff98a1e3cc853babe225f674ca8e7833279bf5e68
Commitment
b2436bc2a0a85ec247e34f9e988429b9a59bd6d8a15a7d816796219134897575
Range Proof
672 bytes (Bulletproof)
Memo
22b9e1dd5dce8889affd7bd8ccc5fec5458856966718ff5a7e2bfa564feb48cb62f9cc527c5dec7e7926c284fee35d1d29c2816c7f2a432d2d4c283cbd193024c9e1b2e1e2bfa74c4ec794f516e6ff00ff9f2dae8039e398de082b764db902ddf09e00513d7e0002f6dca9d74969f69ceb7a68864f55b8e781c4869cb9c8795d (encrypted)