# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
567695a2e67acd7a3a03ad08fb1ab7b6bb0c263aaba9fac281786cdead45f048
Pseudo Output
203a8443078e192fcd769a8fa9b3f989012350c1871a7f705e88f4e1ff35db2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f4d281ccc7849a253624a758e8a72cf05680e2403fbab2a00b5ed1ef6afdf02f
Commitment
fa9b8cacc13ba24aca3db23a4e0e27f8962e182effa8fac2ba6d8dab1c31ef71
Range Proof
672 bytes (Bulletproof)
Memo
dc74c797520b62b5a78cd4223c51676e30f9f962df9f46f507349cbbbe075ead7ae04fc110108ebf195a729e1f3512ba2feda84a4ebf7461a838ff27ca62d50ef06680c03670035e9813a4dd4679132f31a078c60f4cadb293e9e3de541601b03e333c7577ecfb70cdb85b0fc282a8bf76acf619d82e563286c08e160a36b847 (encrypted)
Stealth Address
888ee2d5e3c61bf4486faa4542910d18b5a7095f85d9e268bc4b998f31ab125f
Commitment
a21a4a17c5f308bddcdf0c9859f0501ff770608dd632ae5f7af2e004839bed02
Range Proof
672 bytes (Bulletproof)
Memo
6a15a1e27ebba88b45b90031acf2f918f15daa0533a860d0865b85b95a28fca636b249911ffd7d524ba84165b33d187a88659ec685d67c4a3f4d96773721b2263d94d57d1df34c88930862280651f7c4151afeaedcbd2f82dc2ef6e5f5ffd826536a55a4a893c735f2987295ddb1744b12a98a2ddabc143bd898f48e2f15f386 (encrypted)
Stealth Address
dcc3263a9dc9e237c95ebcdd0af1bdc2217abdde55fc6e54890a50939a67f15c
Commitment
e2d7cd34b6beb14d4fe39bf74cda2fab6b892a2375a7e973059a9dfadae7ca50
Range Proof
672 bytes (Bulletproof)
Memo
91ef0a3bfc40949aa18941761724f864b8a76ff50935c05cf201abab83ad0d66cbefae9c47523a3341e3c0140c0219b1bd2312a455c9d75a071df4ec069d7a5d66decee567e5ce1e92984d81fc18f5cb44c9f09b46880055ff6db5f66597680d2595b63575d5c4aa9cb3dac885057f0fda489c0afce6eb52f75fadaf27faf2fa (encrypted)