# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f88259004b97ddf9a5fff29939d956caeb414c7aa5a98c0dc037d09857ae4701
Pseudo Output
fa65a4759df0a8483fdb42ee8e74fbfd26bb8fe4f3a061aa3bdafdfddcc2984f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c67d48919fca661beadc3ec6591ac2a3eda354f1ecb91f41af11dd5ae38b101
Commitment
ea38dbad828d0629f6fd916ccf4d541edc526101e7882336af3584492e1a9e6e
Range Proof
672 bytes (Bulletproof)
Memo
c8166b25b62da5a0539ede80403e9e4eac40ae3c0414fd6527b9289af43d7c85da61f4fe63bb9008c5e976d54268d0ff49c6409d98726091256a5c946d11fcc68223d3f3539aa4e9935f50f77c4507df9c8a162574e442245d2fb8d2f221133c20156b8dda96e4522071f03d2692d3d8440c3dafa48d98311de93d83ebf0836d (encrypted)
Stealth Address
18e21d427fd7f31e60d8d90ac7936179018d768b80705473d42e2e0a13de771c
Commitment
e4e96bfecc42b2424d39df83ae467744555000b21ebdb54993f95ecc9a5f4600
Range Proof
672 bytes (Bulletproof)
Memo
392a42b362ca7f85f0c831a2611cef6babd4e41d2193860834cd5372347a1762d95f39933add38c7a2d75273e72d2c8ccb6f27be3322d2f1537e2e96c26bdc2bd9238534dc36d4473107f459fb44b848981ed57c059279f770e12b418c0cf3d5bb7dbd587c9f30646bb49dd54c5c3a8dbbe73fe34609d37cf76b6bd23261bf72 (encrypted)
Stealth Address
383c4f173b4fb3ef6cb6e7cee1b6926b3ba0d533a35a5cd3ce0574bab61f1c79
Commitment
f235793200875ca0f36f08a4f8d7a6780f9cfa65191f2fd4fa78d7eeac3da25a
Range Proof
672 bytes (Bulletproof)
Memo
4d707c6f5e166e9b2638260b4493175c8ed2f2af6c9b212ad1d38bce9ee208f29d167801996aca38492202bb7f5ddb6bbea20aa3f940fd21e9b77fcebb7169be78f7af6291a4df76214942475d943713140b6c05c5ad62a1ee13c8f01cbd146c69f8182789e84fcf4d26b142e560dfa1f707561f00739a0ac752535756409aea (encrypted)