# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
866f2bb96188790510b0d7bbfffc2ba5610f661c8f6eca2a5459337078969223
Pseudo Output
4605e970b1f4706356857b745ceed4c5c2b9edf681a7ccfdc6cacc16eaf3f376
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
803a5a8babea2cd6888a2e8954626637812e03f551d6bab36780c702dc445a2f
Commitment
68735ab700e1cc329da1d7ebba18236bf9d43961c6b21eaa37cce2dfcd13d20d
Range Proof
672 bytes (Bulletproof)
Memo
22a8e4f8c1d454fe170d4597bbd728458b730a517eec1e3e7046e8417692b2b72310157b9b0ff0312b71240d5982f766645b5ab43ea3c57d24d10117003e3b197997de90ca787f560735f0974119faff62301ce624a47a568f28ad3ddd2cd4e2d491ea4064a4e82787544b6c4b38c4095c169349121c3106c0a9b5139e8fb28a (encrypted)
Stealth Address
408c5d38ea368f0dbad616c6af1cbb624510fb5e8e9bed289e9f378f4173af28
Commitment
7647f91cd89d212c2ca202babb6cc3e2ebd23866e73daa8d8e15437d7948245e
Range Proof
672 bytes (Bulletproof)
Memo
4dd7b31ab609b205960bbdb3ec82ed3298283c15baef5d8debe4a6f899314a0980d0cf93a21b2ac6ecceb1a0f365a11adbb6914826d4fea5ea86a07a3198e82d1ca4b1876c0dcd5b687fdcf836b5633103c93951d23622910aaf5f4db3b8c8e7d48725ffc22fb9fdb4686f9ea647e309b4ad322a4f98b7f28d3d927da0085656 (encrypted)
Stealth Address
94feadafb97eeaf9bd8e6d35b3996d0629da0426847387d20614016bec586148
Commitment
86ef281d5c17302045281a24ad595249dbe924a1c8a91612b2b9a9857c7b851b
Range Proof
672 bytes (Bulletproof)
Memo
22b8569c242516d639fc68a6c3282f6eff1f59a8421aa059d2f58be162c6a2f49549d81fcf0c102027e63c290d32c6b6ac237e8324ce40358f1dc64f9741e8e9f9b071fcfdba89260b239adfb9d3b8aaece8f8697b4918b7b07a354ab5cc68eac07d89374d9ea036858b0ebdccca5cbe837776305b37ced3263c18bcfc0b38bd (encrypted)