# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa826a6dc72bbf57066c9697785a4ca0c7af9680e99cf7a52ba46ae94283d82f
Pseudo Output
04873c78178722db720f45f84ea4031bdc3f711446df57ab3f90f4ff593adb32
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
487afd966ed298cfcac583408a94a50c937c3ff1a541c3464d1763214f82d076
Commitment
b601094afee056a19295aa914f8fee5f0f4b110e05fdf59bc0eaf31f7bd84040
Range Proof
672 bytes (Bulletproof)
Memo
31dde12c6fe2ea9ad9e86030f78561e6891e3bb27b4698aa8d0857e1d5803dd5e95e17d60f1fecb12b2a2a7244903c1499f5af716bd25d148ae700ed1e88f6b15a6915a5e5a660b17460ad2d9cdbb8bc8671743b24a36375f6dadcd6eec7c93b7ce7d36993a51364158a03033db23dc61f74ac738919db9c3374dd462a665c69 (encrypted)
Stealth Address
72b26f6d1e63a4555a662702ad29939747a1111c7c3482109b21c8d5f4a1063b
Commitment
beca45e3d9c9d92e95bb645be65ba46f5d7ad46b3978276ee45881ada2fad57b
Range Proof
672 bytes (Bulletproof)
Memo
a0c91d43459b056d4bb321a23170241574d54185c858c1f1a731eaca3bb687c91291f29579556904de67ed24f622e6696f5efac949fac987ddd9b520282505f95049800a23f7c0918595593102880277881039c75395ccaefc69aad21633e0bb6deca4a10d0642eed18f9d5920674c32e603143939cea5480a0ec59bcbe4b2d2 (encrypted)
Stealth Address
ae1f748d06b1f51664f85c113cd2a0522754280f8ba2aa29dfe18fcc67b92b6e
Commitment
6e5e44bf634ecc8a77882dd215f6f84b5a860f8e8be239318dd83c1127014956
Range Proof
672 bytes (Bulletproof)
Memo
329e6b8080a6e7d007f4eb9fe120ac89949a6c2da2522261009fcab1fd5a9d856b576f7ad45527a8635df1a9b631152c2a9b5881b84bd771dd23343cc2fe2e1650e549b562cc471bf2b24b7a4ae64aa58e29aadbfa5e942400624d3b27f0919ab039d2256bb0f31821fa5566040354202db3834ede348b3ae9e7842740a4f4c2 (encrypted)