# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
826d1ab52d8c6676f13c72cc5a8ecc8792f6b8d4410fdde1b29cf6c77cadab6c
Pseudo Output
c0fb268f665415e773dd6ee94194940beb30e45210e4cf98ccd3de12bed6f739
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82910a0a772b2fc76c8ea0ffe9bbeda54ef82ae23127ffc14e52e6da098e085d
Commitment
52aeab82d1747bcff9baa2945fa488cdc1fbe70e2d13a2bc27872aa207e8e923
Range Proof
672 bytes (Bulletproof)
Memo
fc6de97c1804e9e538cab51c439358bdfbc15ea172a4f3a00e0e0440e70f6bfe742b81c66262ab6c131fe665a8dad6fb0a58a692d9a5ad892b29800df9a621ccfd44164545bfd6ba173c72119816d2d06d6a04688f6c337b6b59a57ecfd0d8709e77d7dcfd4c74b604e22ebc184ad71b21ccb9d892443e7132cabc1563702ecf (encrypted)
Stealth Address
2c8ad49e6256962840153a156b705ce86f4b2f32734fe800219ecd29aa0d295a
Commitment
dc8c94e2ed16ae929decb12e9ae8ab579dd0f60268f594af218420bb08cfe543
Range Proof
672 bytes (Bulletproof)
Memo
66393fa6396840a1874a9eccad16dc26a873e7e53b7fa347c9490f39cfa6f0c6cd091c61b523703fbd4b5c64c1e1b05111ab4cb8a0636bfc13bd767d385862436f0132439cd3cd2de096a24989bbcdb329887a5a4f6f74ad4df3c559b05b231d04c280e4a800ff5b0bced8751ba13ff84969af764c0d9cb8a0b62bd841c2a6de (encrypted)
Stealth Address
1a5fb35df57e91993bd2837e2021fee762d87d665d59c83bee2ffc5ded0cf354
Commitment
d848ed60fe1e0f0b5fdf6d48647df934e6d0e5c4c8cd7aa80ef5320d0158f66c
Range Proof
672 bytes (Bulletproof)
Memo
d58e0359e0ef3d0673a3fc77f61f426eb9a6f9a53db7c1994824f70c9c47559472963685609057dcede488026ecba8e29c078823819dc49c7de494384cefc65eac5ae463f5a3d229fc11b99b18ef64d6415567a0002ef226a7c10765a3125b0834e7dbf8594b724471fd9fa505dbc6c91f5b4a8b3fbcfecd23b2a1d0f4435f08 (encrypted)