# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a32c43b60ce47b0fbf25d11d638635b0c15f91db635b9783289f4c655933046
Pseudo Output
e08e6d393961c05b823432349f8cbde336edfd1aab983afd2fd02bb10f24184e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
201fb225c1b37f3ea71f6f23e5175be7259ffc063e20a478e5950c7c89f54b67
Commitment
281f6e4e92172d2a8030d025bbc893fad3234a48009d106ee723e97ba331b204
Range Proof
672 bytes (Bulletproof)
Memo
b3dae24854b8ac9228adc9061a8986ae61cfa948df68c1caa598df47f684ca9ce7bd2f2f8b61be90c015e5847cdd16faaf88740628c4e0b207d70009a7769c73fd20715f4483ec3264a8f2d2bfdbf6d59e94b306f6c53e522e699f1bdc26805518489d7ae6d2aad0775c7d610492784cfa865e2acb5141c242fa4b9ef8c0cb50 (encrypted)
Stealth Address
6afddbca1e418d259a8f55ea37683ff907cab500127e0ba7c8f91444bebfd766
Commitment
deef7eb3824ccf5592767f10377281827e210b7e11b80e115193ff2d1111af5e
Range Proof
672 bytes (Bulletproof)
Memo
03c9f83705ac9c1c9768b1cb1c9f9efe3c8cb9d3c9d5c61659873f48c37a047793049a6bfcb59cda8173681791b0951a859fc103b4b19c9e016632c89d902896c8671fccbf68a0cc8e65b722debad27df72fba2bc9d8f3021c9b0873cd5ead6734748f16dc908b64d82fd866a82c5909c76145e023b72615d8de5006ae800643 (encrypted)
Stealth Address
fc787623da4c71c2b49f2b9193871edb610847f471f4dc61712e19fd9b0bba54
Commitment
68694ee5050c488920aaea199ff7d8b1062a1adefcbba72e672fc2a4216f0025
Range Proof
672 bytes (Bulletproof)
Memo
94dc2fce8a3c61f4e20a01188b7df754c331da0020e677225291a8fa289d5eb2b0cabd54a230aadaffb5ff57efa946a6278e504835a274d21e377fd21e9b62a9f777fefa41180a9c587f927aa314826970b827775f8647ff80375947f6f33a8f96c9cffeab4a142ebee3744070370670517a1abc4f53600c3654a95df7964640 (encrypted)