# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20a0662cdc48e0a3b826c3e69acbd9b62743380f260ff2f9b17aec0589510435
Pseudo Output
f8d003bdc92651016348e7765e236a8ea0aebca0cec754808770667d8a2a924b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4222665f1532bc477b93cb52898aaa2995c748ea758f5c5b6ac003fd7743ab52
Commitment
5c6ea1b9453d713e6dedbc3fc025c180175aa0c5c382064828ab8be5ae705f7c
Range Proof
672 bytes (Bulletproof)
Memo
9c0384c3686b11a037102bfdb8cd22182ce93ec76f9fa7c53f1908bad7c813f6f9014d622745181462499dd7edae9f36a1925857ce2506d968f16e39fdfd5be1a0b84d4fbe715007758b1ef93c436826b890a5c688bc102777ef8fbbe82b9196da11aaab737fc39a488083a778af14d3c857db3578f4e963e7b994c00dec5b92 (encrypted)
Stealth Address
ee001d07d1c0c8da723afb101257f95a08029c378b6356d38c787b47ab24e241
Commitment
f237d8a30e0219f9dc52af30660aa73310daf8cd615e9c57d3ee9859e6d49e22
Range Proof
672 bytes (Bulletproof)
Memo
adc780d9c38133cf497ef1e45aef45bbb377e2f7caa39a399f79ea6eecd040b42de76c77ff798065183ca614c1bd9284120c3773e46dc8eabc75d9c550f574d1db0891dacde4bc8e9f1701047db60fcd1f99a4625198eccdc900e5c5a2f70610fd27080cc6de99351a8061b72d1e88cd0ba84c3c200bee038480de36605cca65 (encrypted)
Stealth Address
567018317bd759bf746590666e3d5810587b3c1f61df6d70e2ffa47fc978b246
Commitment
aaef6553307776a9d32649f4e005e2dfa9a91ec63d7f62f7c773c00dbb324909
Range Proof
672 bytes (Bulletproof)
Memo
5d59b0af57488e8cbafc8f162c6d7a50895f21e07ebbf6df02a1e804f1e842d4db378ad28cbf787d5b62c7716b44c15a2c270e11f0f70a9e8797a86b2b48fda9635f8cd015e330235ce9f7ebfd11c972ab250dd2e301cce16f459617b03c2bb8b55078509658f0af287071a495d639984dd05657fb56e0fad9d4109a03eb474a (encrypted)