# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d88228df8754df05b43283144af83d67c1db16f8c0f9abb5eea7ad12758b614e
Pseudo Output
f45870f0644e508a640ae4bc81a2b0387a7e2471d6a9844918f6948e320f430f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94123bc911820a19666dc44341e9197985cef2a0b67135e910305983ab148152
Commitment
36c20af86935e64b5e2b6b154f74ef992a5ee88acc5f6df6d4aa83a9ce043007
Range Proof
672 bytes (Bulletproof)
Memo
0f793b9a471d1d32d774ad213b0842b55c4bebb06dba3e72ca124eedf8d67a759d4ed4928290731f29f204e80d6fda52f59f9f6f86a5b6eea3b3622d2e6348f82740a35fd5aed6978374badcb95f28e64acfcccbaaafac8da08a68cfb1d8c1cdaf50f8631970d5eb2bcc76a364acafcc92f59b3374e8009c030187985eb90752 (encrypted)
Stealth Address
f6327348a2bda719889758f42470bebb6ab871d806e81ea70d6b7b315874a862
Commitment
621a20747e2b2dd6a9752f0f78f475c8d091b4a19ddfdf8682da661e42ce3a32
Range Proof
672 bytes (Bulletproof)
Memo
dfab57e688ca733d1022f593166e876e48a07f941c3fcef4018965984fee360c8c7740536a0250b3d493b7e3d389a15f1837e1816115210c72f445bb83b63a34dcf34402fac3e9deb6a96236b1e6d95aacbc0c740f964b7e3941665def851eb29133261aebc5047d5adbf1ed6c00ccf3fe13ffa69bb07332a627105517b37e84 (encrypted)
Stealth Address
fec1a1b182400c261b2fd7ad2ee48f45a9cc89000cc8a9b81949211fe6860320
Commitment
8092c519f0cb576b370e2d38be8fda03ea8b9ce0ae9d0da35539895039770171
Range Proof
672 bytes (Bulletproof)
Memo
bf6f3e72143ecee42a0263d6579a76826d4abe9823bcf04ecf28b54df420d6033460faa72cf966768bbaa9b4c6ccce6f6dd9074cb0e1204b8cf8af089f612a18d1963a86579ca3fcddb0367b46abd3a14e54b88c9b938fc8bd6eaa6e26e5f10bb9746bcf0523703cd3ad91f255bc8a63d7ea119a4775c78fcf844a0c186d3c56 (encrypted)