# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e00699b5179aff6f44499f0054ba361e807a4b66802ce7e721fd35e267e2942
Pseudo Output
4a82e1cf382be4e8cd8c7b8ba1382f89d99db2097bc2eabfa27a9b52d77b7d0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fef1ee987fe992f2a88bd4e2e7faba1217aade510cb1643a673a723f67bbf96a
Commitment
fc6abb97557136f4afc895ae7cc63198a900ecdaf5009241502dd43978e9782d
Range Proof
672 bytes (Bulletproof)
Memo
d737c27f625ca8984a963fdfe59b7a439c958f01114ed4afe9c81b92576a4aaaa8033a2d2c0866670dbb0489a1ecdbac30a7d1aaf44715efcf8737658b238bf226c9ab171a2f9e26dae8052837ea9ae52222e9d496878b461030829fd5dba3dbad6b93a2946814072cbcc55ab0d5f2d38bac3cc2e14a11db7b2f81c110fbb205 (encrypted)
Stealth Address
cadb95a9d4db011b0eb428227dd0951103b095de129b667a975051b31a10fd69
Commitment
304e9d8cf07a8ab33c3225b5277f4adc7da7261d1c2f6b3834008305745d2a04
Range Proof
672 bytes (Bulletproof)
Memo
e58b304362662117e694a692b6c93b4fdaffa1931a7e48a6243515cfb05b846bcd574054cee3e3d74c245fe9b58d413481efc2dc0736ecb71169e3a60d052c3f25be54ae51634455d7683dadb6679f251e867838da136142da6b0bd9250d89874a5d9a1577c33c499011e15ff616fcc2c90abf82a46798ab58f609ec696808ba (encrypted)
Stealth Address
904119b21eb384a9e02e2ae0e82246a3db47a755078d856b4127232202360a1f
Commitment
9818e2da79a8f7d08d3d8ad12fd1ece485c9134cf78397ddaab5cc1fc78fc937
Range Proof
672 bytes (Bulletproof)
Memo
773cebd3eebd4ded48bc9c31d1e3ced2ab2e166eecb166ccfeebb5e944be8d84e137b2098255e91654120a9fcff63a0ffbe2c79bf67b8a5fb98b497714a71262ebe36d694bc765c0f60a3ef0d64416fc9d587924c20bcd3a16f4a94a6e1050b4ea67524a3ae39e4a7803e80f6bfb97b8fbc093f0e88606878d9e68745c90354c (encrypted)