# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
82aaeb21b601c90b2354f681bf22b19c162100a107f185e98e5e35600a77ee34
Pseudo Output
c2d3a6523dbc97e25449ed9449bccfeefc8344d891e1908cc4764fd7b845c861
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c6a8493e277131213e380ec4bec9e8636741729e6632dfdec162e07e0ea99269
Commitment
5078f42d95d9bc066a2d2170fdda07d3255260a5ce79fd19e9013bc508163120
Range Proof
672 bytes (Bulletproof)
Memo
67acfedd341e20de3752d68afea56d2b5ab1e08506396b1030a18a420c7159f467c39696a28891c3386465c31c31d924f1cdefe593e34ef7369af617cb7fd48d4c92c8e648c6ded69ca898b67b4736e65d1c335f478b1d1869030449f5c6f0abb099fd5cef871ae4c5cb122bce7f51736d29f8056128acacab71d90a90fadae0 (encrypted)
Stealth Address
8069f41f522785f6725debcc8b5526b514d54250922d48ccceb78eeb7a63404c
Commitment
76363f9658017461b63e8575146bf8dd7933591104c52cf21b1c598090546623
Range Proof
672 bytes (Bulletproof)
Memo
2553f98074c68ef545b4f6eb9a90b14924b9ad55419159b1dea3261e549351c3c2ec0baa92653bed22835e038f6a51496e33c21e50bcb41d6080307bb837efc1ae2e8f4d4c18df1588b94489fa15f587e90b520fe3efcb1307eec0850bba4071404b0243d2d61aed1107a28e8a2aad8701bcbba40057cf89cb884d78f12eefbe (encrypted)
Stealth Address
daed94658fdd103bcc565f898eb7ddbab7d10f6c6e4747ce53d51b465cb53132
Commitment
6818ad4f2407fc27494f946323786488beafc9576f869fe1eacd407ae56f567a
Range Proof
672 bytes (Bulletproof)
Memo
9184189af6592e887721cc7ffe31f7228add40b2e16ecc58ad6744d4dd8f974f4867f16135509ce5cbf992b978ee8d6dbf424fccdc84f8507290c93d6663f4f20748be15625855a839b0faa204fb7945d25b31ccecde841b4313fcf333b09dd408ec2269f773710537e14882dc4fb65cab715bae6d7798081094d306d2fb893f (encrypted)