# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08d36056bac45f0bf56da40b3170f502a2872c541077d200f08dac4b9d4c3c76
Pseudo Output
b8d0515f937900a65087a1893b39f48d3f2e717b275debec20c22d0dc133721d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f47f6e7b2d2cd0d545f1ed3de69f21fb2b8c53e6001aec6b79c68157a80bed59
Commitment
28828bec42d4a7426451d954b6d6d732bde7eb8bb3864b5556f98ea19e216166
Range Proof
672 bytes (Bulletproof)
Memo
332b71216b5dbe7654fc5afdf2648c68ec14e10b05fb5607c3c4d586126392e9816dba7d57c9f1c526705ff5bbef61ff727e5db2281b869df136edfa08a8bb0f0763249bfd6a1e5da20271f9d96fbd8d5d1840244851e8fe43f4801a7ff5a7422de0bb354753b2f93f0cc60e73dbdf8dcd9094beb7bd9e6a4289869378e34c96 (encrypted)
Stealth Address
18256fcf6a587018485efe46ad15bdb9e0077862e9b7a2678fe7197007a4d042
Commitment
6ca8dfe1c26105af54a516ec0ec6d2303092bfd24b2f64a7169122b168265b3c
Range Proof
672 bytes (Bulletproof)
Memo
7303cf97e5e4c765d0429b57fda45cee38c4681818023fc96a2660119eccb636492976776b7d9467341b1f0ae341aaa858cf5782384660f014858bc13d4d9db93fe5f74849941be3b98b9d714507e99cffd3aab612515a59b204439cb409587b5540e0c55c9bc42fcf4aac6144eac7fe589a65dd3676670fbd1e733ddf98309c (encrypted)
Stealth Address
1ecbfe01d6241137b6c1325ed74a02f6435147d5a93c9c47fe582cd329d70628
Commitment
fc8ce5d60fa099a9a330d19225415550835ebdcc80ed230b6ae815796436306f
Range Proof
672 bytes (Bulletproof)
Memo
cd5445dab664f242d846f021a34c621cadfb92dca58f7c7311d58c7342612a3efd2595ac42c81b55ce0c99408363e5ed5a705a44d18aee229a9573d7a3e381cc5dea07ce7ba7155cfb42f3e97ec7f0686abc7722217ac0e671306deadacb24148d74e2c2ae41acc13d69e8e49279a3259c1b312681d4aa456ac69b0779bcd820 (encrypted)