# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa26fcd7abbecaa9eb08bb9d8c693dc727c56aad6deb7f6e55b03bfbfa1f672a
Pseudo Output
f8dd04ab14301500afd9d3298100b4bd1e16ba36434e292f0e88de25fb256b3f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f462acdf6a5d3ee3e5b9e7637b6c3ad65b0b67ed3553cd44ecda1ca7520eab2c
Commitment
96c2dd4fe4ed771a9890fcfd7d5987da118c7c9c56ba7fc40fbfabbb6a35bb58
Range Proof
672 bytes (Bulletproof)
Memo
70b4b14adbb249505c3fe64275e3a472eab3cc01b2afd53aa55340ec6075b298bd772369e23569d5a1b683c1a69cc1ff014be7fc6356724c59e186ad92f5126aff78892762df10f96defe6046ad82d701d9b2f3640705d4c453e41f887c53d7027b3917cd4533753c3d628aad8919aafdb937485815f54ccffb02e12ef8d287e (encrypted)
Stealth Address
3cf37c110c1803ccb1d195b7afac9efdef63108d7724cb26b56710cc3c307860
Commitment
6a3962dca04b188b64e4330c26698a82a1ee04fd57fd161f83056c97d5c15217
Range Proof
672 bytes (Bulletproof)
Memo
15a51fe29dad1b0e7e4eaf6cd504efc258b3d70d0cdd5c16f887aa39387f6d2931a14516873d3435c8f89accdf5aa89738ef9569fc7ec6f2f90bd72336d8337669e6b45673590b498d98af1b6be2bb8a9138b8207bd3aecf1dee46c3bd91b21f61abeff065d2a5008c1075362fe70265ef109f813937db2cbcf6643a9ab9e092 (encrypted)
Stealth Address
703e0389ae808cdb0f3ce728e6431ab0b72e425068d51a299ec6859709167e67
Commitment
0e48fe1ef1c986f57b70a5fbe8312281608e5873bf9f0dca5f8ac49ee6763348
Range Proof
672 bytes (Bulletproof)
Memo
61c29ff344096d1b8df10d6e7dfa87f728579c89f20d650a2d40382fdb0939be7d6941d3d6c2be6be5b2f0971e7b85d8b100f8b6caadb950c2c1421ad15551ccd8da5f484a86a046557c58bdc8ea892e4b9a447df61962d1775c480e9d564d60e5824ec9fc6fc00cd758b81755ae0172490b4c31dc0549a40063fbf85077ccde (encrypted)