# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8052a655b7e75820a81fe3592b0472d27511443e1990dac96ac9f1e71dace661
Pseudo Output
20e4b8f8ddbc46c38fb9702ad81d1abde20aa3ea2d2f43e2a570a8afae44aa40
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
906a604bb3483e6faafaaffbff2d40a199fee4731c8fb935648b214c4b916421
Commitment
28dbad5e5b7d1d0e50d06cf6651f8db5f6dc86e16a399e78bb66f34b0f0e1f29
Range Proof
672 bytes (Bulletproof)
Memo
c8f0ab997db9a0e2a10cf57c5211000e5f84e301a9f2a49dcdd1cae6bd4eaa5e49409797ca368a918d3c2a3bea6a72fe93d6f3e3091eab0c33806de0c202a02b956f62749fea20436773dcb359b88d15ea3d9637d53c3dff34345244f8f5505aa863a5c98e5ed34a9c5f1fb42e12d619d8eaaa84526b92329aad01b9156e4ef5 (encrypted)
Stealth Address
b64cfeac5646dbafe0892c5092dbed00b3e29b2e6785d4bed88c22cd5f50a857
Commitment
ee027295c2efe3e826bbb342e76d00d27fdc79816b6c185f559211dc99de845d
Range Proof
672 bytes (Bulletproof)
Memo
bbbb57b6dedfd09a3ee593f77a44067a86e0fc05d018b00aefc74c77e5d51ca3f3e3690640e3920d0dd855224afb1f55b47c727cac4798748345cbaa17dca25e9e03dec0ba00c4f0b81486a98897206a853095871f9cc15a265874800d586baffaec5dae713d0d13f95a3481c993c88a905aa07a314dea4f725bbabc4a183ed9 (encrypted)
Stealth Address
62d4dbfa25ce23a94de614068250c716eb8b0a62bb4061ca0e06c680e456e85a
Commitment
ba2014eba13a8376999c9a3a1a1bccf4b75d12ca0969ae876285a9cc50eefc0d
Range Proof
672 bytes (Bulletproof)
Memo
3b6fb7f0235dcea05537104cc6293e8e835c82fe8099d1036218cf481af2af278efee3a76e6e3dcd70d45df2c99ce65f1bfc4f32b9d63a79b1b9eacf53fba663632a8f3881848d732314e65667fc90aa85b9a5799783723838dd31a5bb0525c9af960032bdfc3a46df8ff3e439d4c556d034b2fb2f3cf2ba29acea249aefd4c5 (encrypted)