# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
04fe0e8d9cb186113b68996d00d753c00bb618ec8e079402caf672488f5ae15d
Pseudo Output
2419800719114cd0b9b9e6f5eb6abfe03369f457c6c6dd40fee05daa009e6339
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
968f80450cbadff3680d589ee031df0ee0c63f548ba15017dde27c5f2b136d2b
Commitment
726b7f10638d2612bbe563e9676af86a2ec57a3143cfa15b90f14a05ed227769
Range Proof
672 bytes (Bulletproof)
Memo
c6b757990964aa8addfcf10e8c213646c7a4eb10cf91a30ccf1caa843b65ab4697135247bf4bf7dfca6b22712c594d2d867f0041017f63af9d1a5288d8a5a3c5ec94c2f44e92b4da64c2d49d8dac9309f5e76481f1016573e337ce863200fb669c0664730e4ef566932e9e4800a0db3f7fd11b843af4635e06f8ed76918e7630 (encrypted)
Stealth Address
20462b01549de0efa2c9c10b4e765b5eac9fabcaca0804e3bfda9b4d93d8f800
Commitment
8cb0ab3bd8ce9755e2ea68fa946d6a0814d7a6e2a024447308228c15d4f4f767
Range Proof
672 bytes (Bulletproof)
Memo
2a9ddb6b3f33130fc68cae3421c99759b61f4f989591f6fecb851856e32c5834c3c2a8a097cb95fa0ac8dc3167f4636293942346c2b655097d761f903772a18e2ae039ec59033f472925807f73ed756dca5dca12c600ee9429cc04a1201d326a24d3f775500373b9abdf876ac33b99af62ef3f782868f591762c01fb213f5001 (encrypted)
Stealth Address
7ca7172b4e56d9e41316837511f7aa234a048373be30ae90ca3294e1fc86025f
Commitment
e6c115b6c61e02fa885550abd85b86fcda0aae3ae4403c2a19d2d8e8f0f2cc1c
Range Proof
672 bytes (Bulletproof)
Memo
7d2927cd0d74dcbe00f90765f52fa102291a4db53a7255b02e71c8eca9bb1e99a69d8de4a6cab1472ce81d271bc32dbe1101c0a2588a2b00ce907d73c0ff63ca93f697552cbac87f16c85e9907ba9a842901446047a445a807ed9705dfea4ac792258a301c234f708489e01bf9962f0a959c4a79bcedb62ed58759e35f2f6f53 (encrypted)