# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32facf150f66d34b639dda02e10bd468cfaeda4024f171e4c664d578cea3b513
Pseudo Output
f8b2564d31476c5bef3495934bc7c8eb4bea69283e3cbd568a798fa881172f6e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c80faf8f00fccb12dca6b9657e22783543fc9787c2b3d03499889451590a0d2c
Commitment
94ba32b5251203f209b3f845f5fddbcd071e4822c3866369eb777376e8cde019
Range Proof
672 bytes (Bulletproof)
Memo
9971e80575682453b1efd920e9e77d35de4441b9653c3736dcec7bd815a012940a94458f9373f8c959386f4cde5da5df05305cdb641e0e744177c99c9a9a11ce5849af48cfcf1c78650cea0fbe98022fdc6a283ef006b9fb5e635c607494d417492643ca98f0346716e1523a534d5d6f5d19ea1dc3f82d40b7abdee6e0613ab9 (encrypted)
Stealth Address
d4a4935b5493038e199b6def7f6813ba0bb2683d979f128159b4a282c9e42953
Commitment
380aa92ea6bb22e7f7ae228d7f54e4267103d87c23515783690ab51ed2fcfd3f
Range Proof
672 bytes (Bulletproof)
Memo
57e13c3640b2aecf78d59b55feb6d0bc2f7b0565e922773f4cbd95a232d8103cae0e64eba62b7fffe5fa3675e8caf93d3672c415a49897f630278a4b4b74224a902741d0e88eb366721b08a3b33b7bacc9361de43c0def2c88f5ef2fba9420504118e39a538283dcab8023b63a3f641162d9fc659b3269e39a9baad02b358835 (encrypted)
Stealth Address
0c183cd325396b17250c2d56b6f77b983fc7bda1d77e5959aa07b2c156226944
Commitment
145d437dcf284462a85261afb330ab1b64098da99011567b9f9c2c367ec31b5d
Range Proof
672 bytes (Bulletproof)
Memo
74ed2d8f708e3adbd7ac3c4d08fbe615c6c1a95c8a07487b302d1f5cacd8288083b9b08bdd957eb0a4bfc1e54eeef51cf7ac1b1ff6620c901a40c90e0e72d37e06d77cbf8418c7edb1efe850fe5b70d7dc8ecb9565b630e50c48127190059ddaa38e1e519cd91bf6610a9cd3899f9c1fd3085b40a2b4de2e79c16d93bb244858 (encrypted)