# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ae14a646d1056491b61ebbba8875fe37fae792d8604e09b90eeb145cc83bd539
Pseudo Output
a4af74657859d429fe7a24aa5618582871f6fe34f69c54f7986b0bc70b34c01d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f4146220300bfedad87352b8323bcd725687c8af383590c964756974d6b3e60e
Commitment
7cef28fdb4555ae4667e27a11ae7054cab4f3140647a7a9d40613fa3211d8a6f
Range Proof
672 bytes (Bulletproof)
Memo
ce7ce5b073ac3c4af92445de5929a970bb4b377795e1434c73706896e0f2c7cef8d163561caf129623cd3b510266fd22d175ea6edb854cfa6a67f87fa956c53ba7883b66862d24bfd232cdaf6e47b8fcb70df5216bb3e0728151f40ba229bddd0544ee93176f1dca5775af0f85d8805ae9f38fd127edeb9a19f3e6b50265dc56 (encrypted)
Stealth Address
826f8069f4189fd006d510c3ee08df121af5f95065df31e4238de17e92b42d16
Commitment
42e00ec6e1269ce309f301783654f891950f81b58a797586ec9daee89cf37512
Range Proof
672 bytes (Bulletproof)
Memo
73a382313ed4495aa4d136a7921face81d7891087ae909cdf5825c1c75314e3361bdf1871bd08a9231c5eb70c56ef3c8559aca6550a793802162419b94a1d1ecfd2c57f3b07873725669c9e1158673d250d49c348a3439790df38524c3d488cdb5ad5b9b3965c7f74dd0c78c777390bf59d33a58d26a09ec5d313dc8caec6f03 (encrypted)
Stealth Address
84369919746bae46b6b2e9843cbbf57ea63f0f69c9417e7536bc569f76de6e7e
Commitment
c4ff36c37a6142b1654def4a1d8f601d3717a1ba6e0675087d87ff9242f0ed47
Range Proof
672 bytes (Bulletproof)
Memo
0c9fbcd30b562a904447aa672cbe9a827c57015ed78eefd3adb03f43d1428059be67e63db05651818b8e3827054d16cfe060e9a6cc34ee8f97f9e75ee90b96374cc207daa490f6112c9a0844676f00bfaa12069d375cc9c676457372ddf403a10a3112208bd6ef096f306972a7914d8da6f4d22703681f6dd2b4d332d6efa8f9 (encrypted)