# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0cf38f255c36a9be7a0c83d43196fe994af56f68489969c80c0cbd5b5c4dd348
Pseudo Output
8edef03bb7452717ce7ff9f0c9422d40939449401cbce25c92e2b0d1d6143b25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82326b31193885ade8f95005b5079b579a5c6b7edb373aa24e8692df0a44337b
Commitment
564cbfda72745b6a04b433c0f9447378799850a235df775dc5556ff6c3351979
Range Proof
672 bytes (Bulletproof)
Memo
f96ca40f3fe5f2e955cc16b6cfc15392b3472f0548711a0a98555771e0053ad921804a752f3daf2fde86f2ea91d36e621f4c14d31959d057a7ff2bba8bfd46f51667808f2e55d4ed0d578edcf2f52a3814df7e9d56fcde73889fe5a4f38f0e269b041866e6fbb19664a47f031d415631137fbb968297676a27a1e4bf3f84df9c (encrypted)
Stealth Address
08fe673438c530dcfe8348ee6793a098b3c742de430d90776a5d5f4cdcdab067
Commitment
5a9a0b3d73c6022dad5ca635a8917e70046d14a730eaa07f81fd59ce5f7d674a
Range Proof
672 bytes (Bulletproof)
Memo
50e4214b5d428a62637e84e5442beaa93c82cc6a2975483ed9f607cd5bd3f779bdb5a43d1fcb4c40bf4cbce4e0aa656de3766b7adad24def3480b331ea571162831751aac8ed126f80788283e37a1dc3fef7af5bb81f0a6c1d85272b410ef43c6c5f1137fe55c1469c841437a12da50015175e8c50cb22e00de91eaf028c1253 (encrypted)
Stealth Address
a497d864da88355ca25298c0e00e864c7f0c7a27119627ebd8cd50fa591ef84f
Commitment
721e73eda0d7ec4384d620c338c13847d6cb2799ac8ac8a8d4133cebbaf8394f
Range Proof
672 bytes (Bulletproof)
Memo
3e4ddfa4ded75969693591771b23baee0df8a02a5e45d6faf38a98d1acd5d61c6d3309a633b87736727cc9822ca2c2c36a7b1c0681356e1b9fe8df235fc6b4d3e4029c07b63dcafe5bec0811ae3e005d2da187e47e4506b2a0a5413d02c30d816a3e6cb8cfc969f1e3c6e97cff410fdec9ed647b0a17e5b542dbf247a3be50bd (encrypted)