# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
940b80b67dc94fca25b7c5f6cdefcef772c84591b4cf910b0efdbb3405984364
Pseudo Output
940982436c57d8868fea10ccbd52050d51027b50a165995e293350c5985c6e0a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2231d78d654ecab65234872198fe98f37f356d93ad55309ba4777cdc1c87ee14
Commitment
c2641219ee28f337d0db45480d76bc9c725d810390c937020bac61aab7605771
Range Proof
672 bytes (Bulletproof)
Memo
85638ccf6260912550842e13048a3d54a721747e79496aecb2d9f42e2a35c9e36a2e48a138768a4a6569b921f639663b1fd08d57f1b8b0b9a4c598495b6249ab10650bf51d01030a75f0b97a933682be3ef93c45c8c28655b4f25a0ee9c13a8afd5cb44854d2968fb3d6270c05ac8d49fff6c24ab77ffab771c5726302076244 (encrypted)
Stealth Address
08b7a45fac4cdc067f56f6446df049a282ed0cfd09170db6fff1a8ba7b26296d
Commitment
9cdba35d4a856144f807d375c0d8244e10e19a14e4790a241dfd3d2ab06df372
Range Proof
672 bytes (Bulletproof)
Memo
8d348449fc1e436e691efc28ddcee356b6bde04d5be28bb0318d2a5200babec92492a2b18e08de6fb33fd0ff54b8992c678aa8824c11092954333d592171746cfd13166d57bf4b5b713c137b0e25a3c1f9ee48f8c1a2a0963322f1356eb236d4be805ff7454068feddafd4fba86cf163f44dea07e482734749fff0334c1c7e39 (encrypted)
Stealth Address
fef3d33f02d22af5b70404aaa2d32fa7f4919e1d9f272216c5c962a25fade529
Commitment
320e08d9b0b18d581c568d0ea306095621f2ccf2d5f7dd2a08eb17e15e15f123
Range Proof
672 bytes (Bulletproof)
Memo
d8a80e02ff492265b96738cc66c9f4c1a36f1c82dc44f56794fe054306192811088563a0d3fc2a6cb3760dcc0b2a2c854d8260f48c659c1e8071c4d11b78ff6a8c41e17a81c6af211cdbefd5b5f1c0e39d3d9e89059601d1b592d76869a4ec4523bcadf8e362c9a9976e8d633411d6ff073238558f09ebe3d1959f24f2da83d7 (encrypted)