# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
206cf37653535fbb44232b410522100299a55ca64d122082f845b2dda9c60537
Pseudo Output
f2305f0c92646167492716c67247c8baae6eea84508ee06f7b4bff643bdffb25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5a497d53da986b04b5e0229185d6656da29a3be9dd1bf8d3fb5f8dd09dfe1f44
Commitment
20bfd2455832cd810bb7f4e9e27c2193bdb1798f3d0ece0bfaab7d28e30b747e
Range Proof
672 bytes (Bulletproof)
Memo
7395a8afeef77ff9636d45660d69cc4cd810e893138a631f133c709adeb8d59624c33872e142263f0905af09ea54e9263db7156e1f2f4914ec3f19c6d69098b2d4668740eb14b909b56838afbddd3434c26142c4dd4c04adff14b9689d40d12ab7b9b91170706c773f94d2e4c19bb52a488fb73729928883bf8b81218631a698 (encrypted)
Stealth Address
16731e1ec62047d66e7da3d76c46b358856921947e36d15c635897b70e67c518
Commitment
365cb62915b241978191e960ccce6c096dd2879d5f127843129b0291e4ab0c43
Range Proof
672 bytes (Bulletproof)
Memo
3da4fbf443fdc88c0f2acde0dc9281e12dcb546df43aa430898b384ea6de1e6d6cbd4446aa5446504b854ae9d5a9dce89a2ffb9d75593a5eefed85731bd1313fc562bc4b2916addff50a7daab120bd094e8778579505557b33c616b9fef8c35d4e5f4f5059ed678e618e161f3f6196fc414e4e0ddba4b0001c1e94a38f6f6308 (encrypted)
Stealth Address
9280f7970fb801162ecab073a80e1566cee265cabe47bba798be243019685105
Commitment
a8b55067c0be76344d155953a21d12c3b4046d9b98258f6d22b516f5243bc67c
Range Proof
672 bytes (Bulletproof)
Memo
2c9d5338aae0214230d5958b264325b77d1082a605f2a0489f7fdfc8246866ac001922c2bc5d70330693dd04740dbb0598b1ca7103d7e7b5f5c6dd046b23835da1c28beb6013991940fca4734f6d589b597c8d6ab4d78e601ea8ab209747fbf4cc99bcf22ba8a1a763e3f7f4012f30261199c28fe496187d59e65814628b910d (encrypted)