# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20d5e73ca7e972d62df5517097b64760a9003386caf02099a1ea0906f3581d1f
Pseudo Output
6c3ea10b69f607b45438c31628f593b07741f2a51746fa2af9cb0966b4e15f5e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fc390365a8111d3863d4649ec12fea9db9896657022170e0c485dadc2654d046
Commitment
c069edf04825cd0f8c5f2dd66303c6845600c653951ad4641d8a54c6fa728146
Range Proof
672 bytes (Bulletproof)
Memo
7802ac5f6ac130b333e5f6845c2305acac0f9d1e6619f4c65d050a9d5dc6898296dccf0b656ddfc1a638aa4d27361dbe720fd2e0989c26a86b912717b91d12b43465816fa3942fae1e13a41683009da3ce1d4203883f9a2f707fd23b97893263c32f81169eee16c648d07b96c08886aff02c685457d203a083d0cf62797d3e61 (encrypted)
Stealth Address
4a690b3e56cb03a65ed1f3341c746389f33bcff4c9e155527a01adc422919f0d
Commitment
d6553a82814f31388f25b83fcc78732e914750eba2a87c4652c98b1d4434cb41
Range Proof
672 bytes (Bulletproof)
Memo
95c761f4e7c6d7927c8b21d63e770483844287d2d440c223e066202652a8f77add922c9a0c7579cf4085a0a9dd9c01fd4e6c8ec0572758cb7435df1fca0e27634f36959d15c57f3d3975a335dd0a3b21f4aa6dd4dc843cc15c619ad938db3d249182eb7035ba07aac9b93f7a7075a4f91dbea1d8eb87766524d5c046e6330c84 (encrypted)
Stealth Address
78bd761859dc789a3a9a5cbda6e7dbfba1efbf005031ac4c68f5d349b22d3207
Commitment
d6da76ec517b15d3a2f37be2fc52f9147e5b77cea496f90f298b8f0c6200157d
Range Proof
672 bytes (Bulletproof)
Memo
90cc19372cc3a53be89faa04c50e005b85a148d602216514e413b3e93e0ea4a47e023f7440acfe7c795eb025dc75419f5ac14af17a92d8327fd58cafbd66f8a5b60f71d82236bf219460d28cee775431ab0e1d020389e45c230dea1050fe9bf0ca42c7dfe19ddd2b6a015031eb572fb112527b3b1ecdb0fec3a748ab08636cf4 (encrypted)