# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e392f5f55e677c011a71335568264b4b9aad18148a9eb70b5c6c3c820ebd05b
Pseudo Output
a8be57d24b59ceceecf0b411c3ddfab84f8e53da2d84865efc2100e5bb8c5936
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0820f38ff62275db18bccd9d2ef13a53bbd27c5fa2263dd644981a3f187e796e
Commitment
ca08927704de3103963b2fa8aeffe4ce0d5aaa41ff4b3b9b2e1af33502f8467a
Range Proof
672 bytes (Bulletproof)
Memo
d9bb04631f6824398304008d96a913a014d8ed3d0d4a767bf91903e54b42c533f1fe5a81cc4d4f8ec3ac9b0f913822bcba54708f052ffe95faae257b907d681c5aed2168e91fe7b5abb94aebebe775105f5596804d31c607c87ec81ecdeea982fd52acc1353ceaa5d24a9243e0ea8b647e43252c1b3f91b3a1cddc49c2d8813e (encrypted)
Stealth Address
d6ce1d4d0248e8d310e0f1ca012badf73164c5bccd02b0ca04579721ad61427e
Commitment
ac131c60f0311d79f41a4c0d187a4b73ddfed48417bd7124ccbe418b724b2c1b
Range Proof
672 bytes (Bulletproof)
Memo
8dfb9bf8a17dd7b3dd11815e4d1c6c052614dd8f7f24043945c5f182226392b3ad12bcc7e450a12f195cd27fbfe8f19e2fa21670ac7433ab099a892461ca679bddb5c5dcd963a092e59ac1cb53a562f0754faf7dcf3dac913443ad4c562e4318de37a54be9b04bec7ccd4c3785cd07678219f6b47cc43fbf737ce9679f972c76 (encrypted)
Stealth Address
e08fb39e5902b737b13d379274c324041b39cc2b65f7403cfb95913372ac9c77
Commitment
5637370e4cfb255c9a857a1d4dd19b448f7a37ee41c54211896ee96e4fea5101
Range Proof
672 bytes (Bulletproof)
Memo
560951327bddb3cc903ed78db8d2426a2c14798919b6f03df0aee2403306e9eb811bbda8352069000a57f1da9eb258840c1189481dbbf296277527214c7e275105d84217ff95ea2494661a14e756a871216a88c310c70d1b7d68f3cacdcfea897a5c4523320df60a4ae9a50296ded749cbbae534c50bb652a34c7ac0d10d900e (encrypted)