# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f82d68f65550cd25767625152a9d27b0f88134762dd5cc827487fa6bb8bdfc4c
Pseudo Output
188f1a486c44868b7e09b110587d9955d407c8c3e5f3489d0a6348dbb9f45144
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e20c657ebb271dc1f4183b7a478caf3820a36a3f8781dc30b5ead1eaae16e373
Commitment
b43b3db3bb1859b393213712576c711f6a0e5fc67881ebfcad8cfc30e45e1450
Range Proof
672 bytes (Bulletproof)
Memo
f0b4ebb0e261c3e9f27ce6f1cf390fb69d8c639abbb9a5c54e21917da992c3ba1a58005fac179141858fcdb5e5eedfd568dc36103b00c30528a61a6e61476c40ccab198ff83327da97d342147eb2992003bf6d01c43302458fe50201ab015d2dd0bca8f35a8a50ed1e5702cf0500e9c63d509b0277c8196d0429fa0e9ce34e7f (encrypted)
Stealth Address
86217b58834a1b2b59933f47a9a75c50438e6d53c573b4965f1b1efe5a430e5e
Commitment
d8f1dd3d69d5bb6d1dda078c24877db2a6297d22bc93ba5a97f77f8ea74a4c74
Range Proof
672 bytes (Bulletproof)
Memo
aafb2826d442ad1f7f03a18b700b2aeee3eb7798eb1b79f778b2a3b8df6e38d7b5e5ecf4e8525565c4f5044dba4f43d3f130248de536800d91c7211381f872e901451cf34bed73e8eba93efca66bf09836cf2a79493fe5309924309c1aeb6cafb13230392dd1c606c744f50bb81dc85ae544ef38bbfbfd69e6969094090eff60 (encrypted)
Stealth Address
d6fbbef133d38e20269d217ab1bdb84b0adb572ef336df042574424d74930177
Commitment
54aabf5b2a6ada30df23d5b2fce1dd1006d6b3362671fde3069713cae0cf8a02
Range Proof
672 bytes (Bulletproof)
Memo
4b3918fcaa9f891c813a379ce3bf9c43ea6d1da86be305efd3731c171aaabfc71a9463a68983d549115935c6eab44665aee952b86661c6f318a2718956cc9b054f9b5e542c59813d7ef4818b14a6179a447d99432f78d9b387e24a7fc0d228631285f1c903e12025eebabfbdeea1d08de2ebb27d589adb277179e4f6a2018537 (encrypted)