# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7a22ebf460524b73ff03c50ceb4f3eb0ca8c5c6e0a34519c9084eab9d930b45a
Pseudo Output
dce2fca738dc40b68b3f977633c3724f495d5faab962fee60b0748b4defef85f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f80fdac618243d32a4ebc8df5ec6ed88fe78c74bfb4e596831fc0dfe7b04b778
Commitment
f0ed0f89b4a45a4f61044aa962d15424d1332ae57ee5fede97198fff48a5ce29
Range Proof
672 bytes (Bulletproof)
Memo
c9ecd8153319ca544d4c0d61c434dae4275a697603966a6002082532dbf850e9124bb4598809a561d29d351bf103b4240a181e36e18f5a0082b530762517f633e3c9a7c2043769687c34b646a676aa56fbb967bf7bfaf816e3ebe7e18062dc76ab634f1c230a34f1a64de81e58dd65041d3fa90e0ab7f8f0256a794b2828f24f (encrypted)
Stealth Address
7c8cf5cafa51caa327123aa57ee5db6f55d9e8c460da8af645423ff196ac2a08
Commitment
f4f3879f6c650a83ff4a50d66c01e28694899f387c06549196a4f96289c3ad43
Range Proof
672 bytes (Bulletproof)
Memo
e3fbfaf75785eac93483b95e1bc61b40a99e0064dcd220bf4a3cbfd75f6621190310ec9ee44caeddfca311b0bc90b61e2bb4d354b3d2ea1c814a980aaf37d09dae40e3b427f9461dc26a4311b2c95d4bf7587b01e1d9b58e5023c2179da249e755dd283f45e34b4139c3cdd0b93fede03c744b0e658af6ad9e64e669330bcc63 (encrypted)
Stealth Address
500f8289a270b48b96d520e6c35161ef9bcbd56d6ac8187fc0955cb23f3c602e
Commitment
d6fe10ed91f215cf1c9ce3ea830eac1fb93ee9114f6b7be4bda5c53dc379da33
Range Proof
672 bytes (Bulletproof)
Memo
f63a0f546be6c86636e8f8a0a7cf7017f0594b9a7abd47b6d3bcfd6fd87195fa0fdbe3b127660a241b7fc951aaad33b74e8f6b603e17d4ac9d02ae5e50ede26126535fc6e54d4f1c75bc03321145fd0ffe6cb13c938dede396f03a06c19bafe25da563e4d14e9918e1299165251e87c4f2a78492ed9041074a6f21d7ed367f8c (encrypted)