# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a69414e3129f7c48417f8f462666c5e8725740fa5a58dae20ad05dfc6640b34
Pseudo Output
70da880e15373b00c9457b1c0155995222b0551d37cdbb23bbd8ea6c0360060c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
663ce5368384da722964a60f6be93360a6ffe3e85d1cfe8ce56f47ab6c624f17
Commitment
1839a3f147e74f4d9fd33f24a3522682ca32c5d00be299fadd78d99706a2d544
Range Proof
672 bytes (Bulletproof)
Memo
0bcc04e51baac0b6134061e6041d3a47c7941c278b12b9b57360e32d802808638bac666d8bade4a531752475c5401aefbece49c55c933b4878512605e6743241c519ecabf465e18e8753c17a5cdc47ccd5ac678574753ac8ea3c6e671836c64ac1c0e467365b66ea38b02dfbf3f6c8e7674f46c92538c52ea5da4b7bae258134 (encrypted)
Stealth Address
b8b77c8be1c692782f2e586c4277d5941ad655cdd6f09e6a2740fbd7cbfbb75b
Commitment
fc05abf4ead7779bcea0e7c03345de805c7bfef9435ee0615cf2740353f57d10
Range Proof
672 bytes (Bulletproof)
Memo
8e43cbd2b122c9a0498acd36c2eecddbec0935ce8f8042539483684e65ef0bbe020c8cb31546b1ba1861c2964052654fe8984561ba7a0896e38aabdd3968f37304068154e5b9789760da51796abf84c05c0629e329c31b24588248bf326241fb500cc27480ffd72c82d120510fccd0e5c09eca9da0cd0c3f018158f8df0d498c (encrypted)
Stealth Address
1a986c9625599aa18c07695d8b3c9ab7526e170c4c83a69a579629b101183f39
Commitment
d4e0866a7a7badbab17ef41c2017f267000a8130940cec35513fa9872de4da2d
Range Proof
672 bytes (Bulletproof)
Memo
89e6a83c2718d288e35248adffd527c7ce2e3a482a1dc6bce325f1d5ec2d3105f0c512b6d602ea6f1874cdef113fd26a2a5ea7c7e43c75e0a584661164ab8da998351edf5f3eb2336de64f08de833a5af03d08e023156f5a6dd6ca5a6d91bac5583703b95b13f60eb89db7d1f12e4d04b306a69f8dea662fdcca9e81dc79d81d (encrypted)