# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
102b7e7f5b37fad9dfdbc56726daccbc63749fa26ee89b790d463a70aa73c662
Pseudo Output
803e4e144241ae49e5516f24784a2e9d2e02fb373359e7fbfdb95b618d578c47
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa3758562e8bcbd5af52675e9f813bc858fbf0202b0da176ea215b49981f6230
Commitment
880aafb3a65557dd8ed72514f91c7ca722914028ade336249fae802595d9ab02
Range Proof
672 bytes (Bulletproof)
Memo
b484d9d4051219762e352e94d148aab41ee0b5998089edd59ab0cd1714c72293c446a341ac01c7f631d668e85cd98fc6200c6efd8fc13b835a220ecc61e0715eeca0617c5f9d3e29b3760791f1e5a3a98da2cf7d271ca56300b4b89dbe03e493044b1bf09205c72ffc9d8b1fd85d6d70131efda3a8cc66ad4c277c6b0f5fad15 (encrypted)
Stealth Address
a818814948cdabbe2504af5e9673b4e6f721427be559093b57d03d106bb38f01
Commitment
8cb822dee10772debf77b1bda224f781b8018c717ace5e9e24e9c78d8181d916
Range Proof
672 bytes (Bulletproof)
Memo
f05d24183952fa90ad703b7f9e2ef052cbb7a40e912c668021359a315b05c864b6fad4267409630d03b05cd889af5af3572783e6e292f85f50e22b0eac5eecccbb41dd14fff160ddc656e0ccf83a813a78b75959b074800a0a0918cbf9431e38d3402feb73b9aeb52f1d4bc26e9c96e9b22b7e404f766d68b1a8bca2fe73eb04 (encrypted)
Stealth Address
a4e25ba62eb0c43fe2971884a23ac1633bb151bf2eb08cb1550b6128d1fb6b75
Commitment
0cf63323d086f1f00d8df656bf6bbb3187a1651799620e25e216d3a547ff2d60
Range Proof
672 bytes (Bulletproof)
Memo
3be5629de6cdebcd14f2d2718265049b96cce21e363105349fa229cdc7e62d9753c2f01604b80faf11cbaff08385f2bbea42a11b3036e46d1c7d41524ee73b23bb9f3e6c3b05d56e933b66cd254e7d14dc726939a418a4ac7bcdf41a03a40548124e738a611e54dcbe34e7eeaa7e484ed9f8dc0c4dd5196d6c908c954d14c554 (encrypted)