# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20c5a01c6515fc548946e075541a724e4fd33631163431c32dd738b7c2ed8925
Pseudo Output
7e15ad518c54a2e2f13f83830f25ec1b86652f47e8580f251d8aa7bdd13c873a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fc6fa8e0a0544b81b5c7d195f5b6a570f6be6374261368222dbd54b99879a028
Commitment
86dbb8391b2f450480d3f6f4a343e05e50721f13912e3b525bb2e23d3f1eda13
Range Proof
672 bytes (Bulletproof)
Memo
d910797dde2a3717155bc7bd1e587f7e87a37704bdffbf84313424b320a7c4789aed8c10e1624a332d5063fa3ec402cc2e271805015bece07494a1f1a6519fe0aa49e9bacde1aa5fb876214433c51be6fcd1d76e8975788ecb37035ecdded98d48808828366f9c4a9138129f4f54309d6369994d3d4bbde9a49e659b23314d51 (encrypted)
Stealth Address
4c0daa4f7b05ff9c2c4fe0a30ca41bb2db308b70ccd5d967527e553e2ba2f12f
Commitment
8af2c36aec187a560137c7a483f35728ef6af793f8da9a1421b9247ac2b4b92f
Range Proof
672 bytes (Bulletproof)
Memo
af4ae99d0e4d8bb68ab7affba5619ba135294ac6f5e4a259473d55ddb212b751d8fd55a7507332bd717bbe7738690525ce8a6d15aa9494aa288182a030fb4d9eed6ccebf63fadcca196e750e14684504d035587cc7a549247150ad1aebdbc5bd8f4e85cc59802dc11568ffa6726042eaac5d3a932ded638b0e07cf7484c4ba13 (encrypted)
Stealth Address
e81fcbacca66c587180f7569bd66b6bcd351524922dd2a21d21c8a1071d7202c
Commitment
80092579893c77e23512a7973bd2403a7996edd16b25d032cb2aaad3d6dba060
Range Proof
672 bytes (Bulletproof)
Memo
3a21708a4cae2907e02cc86afe3152f66338506f9fe4ba81d20d9eb6bf9bc2bae0e3bc55177dd77701d98cd20120b49c7051d4d0b954a80660e6de858eb1cee800067bee27b04dff43213bf4c28d12cb00f95d916de0d48365a997e373b861603ca9608fcb24630e073e35d5ec6dc0631436a85e17246f730b2b09836e6971bf (encrypted)