# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2245e06e0aee8df06f80289a6087037e713b25dd4e5ba2af33aeda9ec4225864
Pseudo Output
5a25fccc3d94b0505f7f97de0b4daeee98044eae482d4d60f83c91310e8e9340
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
20c0ddf8d51e850f8564aae24c4d90f70da01929c8d1b859e47fbc641f274c46
Commitment
eccd4c430de60748ab5066564286fc8871176619c0cb35d692987045b828b97b
Range Proof
672 bytes (Bulletproof)
Memo
6d7aee7dce60d079b8f313947590af230166884929a4745b97fa244e76e89b3cfa8f486e6a004a1396d3826e29ff42dd0eb3840cf84d13b7762c1c875d1294b5cb3415c8f99997895c935c4bc796a94ed1ccad246f6661e7475c9af02dea0352cc29a56ddc49499962de48f5729416d9ea83b5487e41ab3631315b075eb5c25f (encrypted)
Stealth Address
c8549f24e7c498b174d3b297c8a15782666930188cbeaaa43ae6c38b2d3b1c63
Commitment
b099861e5d2531d12283633378bd821df141a87ea1199541727640d3e5bead2a
Range Proof
672 bytes (Bulletproof)
Memo
f1d83953e503188ea72e371ab5f2c5e6e668b4bf247fc279f7becf8d69672fd30a39ca825934305cbe123950b9b3255eeb69656a58657343796b959dce8dc080b6c2d0a9401f4a2faa3368ce19e2d660f3e4777b84bd16ac5b2c9a74d47fb502076affc8798da4d9df6f6bbc13167669b70737bd88699346e5d19b845b25109c (encrypted)