# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
86f3e3765bb1b7ea11f54e28ecc1c7cb8c3c228c346d43ee36975c8f789d1474
Pseudo Output
6c070ea480a3f33b5a1e67e878e13007741b1f7eb484b8ccd17f3fdb6ec0f701
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f249b7e89e5198766dcdfe3abf8b8614f4f45fa17d628312f79deeb3f060c26a
Commitment
7e699bd71ce6b8861ae2d59222c32f89384f35fe484f8df2eaa86e41d5eab257
Range Proof
672 bytes (Bulletproof)
Memo
d60272fa634f5c7965a259877e6707b71858b29a4ca554695e9ed95d5737c1de4823f8acaa46dd897d1c780e4f50cff1e340248a482b7ff8e395b860909b3eb43423c54d94ba878529ecd809d715a7634572e95494499ee807e02c64e4b04482d278c1fe4e163c54dbaa0e82fee943feb1f5cbab026384dd6b64c6df3edce4a0 (encrypted)
Stealth Address
b0ff6088fe350b42c4ac1d05d4cd926d90a5c507c751cc6a59b9b1a90b75785f
Commitment
50a946bad4df6db5a280d41a0accaba5c05cf963634e3d7da1c4757c5b6ba030
Range Proof
672 bytes (Bulletproof)
Memo
2400ffdc681fe75d07403069e0f40e19e6cf2ee4f43ea2ee0a7cce01338f0578f047ca6098916fd06111fcbab47fec5059d0c8d13ba5e99f37044014636526478d7dc2e7a1e6a735f2af11ca071b2f258bb4d4ab9a2f234edad501236a3af4e640473ea7a9a232a67bc34f360a8ec655bdb4bcfac31263b6117629245cdc846a (encrypted)
Stealth Address
2e3f666223358d13d519c40d61bcdf9f61a9a1bdd810484b16b96db893210938
Commitment
b4c598229523db274f083d83988ed78ef9a76198b0eb082c918e5786fec02b49
Range Proof
672 bytes (Bulletproof)
Memo
5e18ebc016ca121ed96105579f2b99bdd48007191267ce7b791ab5b583b7326c9ecf8e2dbe9b124fded9f27f30e383b1178bfe0a0611bc7a556f9028a481195262de2615aff0a2b923f8b3bd89ade6c8bc79b00b9b4ee9d0119acb5542bbc37d3f160a335fd5c270e10ec5ab67d54fb50e726d48f7937394b281e566da5f3757 (encrypted)