# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
98893a7ea5a1df39b3c4a1ff40fdc017887a40f696c13a14cd3c2bda691e3152
Pseudo Output
febc0cbaaa1023b046f2a7efcb93efe684b771103e3766fb9a6d3ce9c159d124
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4841f4e9ba11857334ab1704f0631864b0d14cf8407a575ea73315e5750bd571
Commitment
6e73efef687102d2b1e2bf71b2341c7b1f41c0be6be1a8edbe994aba2670954f
Range Proof
672 bytes (Bulletproof)
Memo
f03083c5d0c7b2ad414b274ac2cab47146e26d675fc63f63a2ece067ad66b9358ecb9957141ebb4ab5581b1c42d0ca499a6a1f6ee2d22702eee6e6cd575cdc440912b59acb32fee3b5c772bc3a86897c0e7a25a0514ede5102194d48bffadf9e5591a5e8260d588de04b9511517ed7628f1372572126090ba8b3f3755599af8c (encrypted)
Stealth Address
88d5fc7643d75b4019f9ca19f77d2863c5f6f713cff02687ce70ed9475790e2e
Commitment
a46f6ddc17935c1de77499cbc8e2290ae1c7d60190be5ef3279f132e9eb31c46
Range Proof
672 bytes (Bulletproof)
Memo
ce04e62f3bd08166bb06594a237c02b17a3f4d14dfc0e7804620cdd494de3ef0c5841f96de36f0ad27359bd323d8a5ea0e88ddae6c95a7a097ee71f87954a718df56f4fdd9b5d3f8217eeda781d904b335f189e2ac0885885cf5ff3a2d6dd195ee12a59e9b9c7e934ecea7800e71b626e035a8a15e92506bf8900e5b9191f9c4 (encrypted)
Stealth Address
6416bd9716f57590603bb9ca3c9844f15a9b5bfaeb24241075b13367d8b2ec73
Commitment
f4bf51b5729a6b317d8ad0261d05c05fab0b56d075078d9c78e322b10f2a9e4a
Range Proof
672 bytes (Bulletproof)
Memo
641ac9f684e4f2c4bf90b2e88d1561f63ff4f09fb9d583e4bc5afc9b63c206a11f3a490365d97e66e00dbab1f6fa1d582f49467a20bde47edef3b10a6f9a2402611d64e49420b2d991e3123b7fa6a1653ddabc0639532e87f3d011c30458cf771fca54f8dd3ebd521834ebfc769853afb27e6d3e3c726535f603ee5a7d0badbf (encrypted)