# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
209f07f561a41768a9e153361849e03522e208aaeeeb9ed6bd0272b5113b4430
Pseudo Output
4ade0afbe492d500af87f0c1a2731ef675d43485e67898c7ae1c7146c0a56b3f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c8561d86122bf685d9e09d7ab4036273ae593cf04a8f02dbbcff7979b6f6352b
Commitment
fa5585ca3d3d9b701bb04e0d139571c7905a7aba2752f7502a9a8945992c8025
Range Proof
672 bytes (Bulletproof)
Memo
f881fd4f1b0c50e6dc7726394b39364aec33536bcb2e3ee6dc74427b4a2267e3bdadf710552de4bcbaf30b55d8456c4572c2a14cb66b46b8cdfac70d57d63f82750e16c6ed05dbacb4bd7c6f38267a3a97f17cecae2410c3c433ae871bb89d7908a48893a40c618dda536643b1eaa72eaaee86e6aecf5c8437af4376d428ac60 (encrypted)
Stealth Address
f0c7f00079081116f85bbe40b4ddf94bef66d80a0b1a65e6ab4e8422c24cb248
Commitment
14d834ccd21b85ad906efe78b5dadd4958b15b12229cf83185af846d6808c96b
Range Proof
672 bytes (Bulletproof)
Memo
058be139343041d32ea7e05a5133e39325f64ce517a5726b4cb58cd8c5991108b1148473e0dc4853c0789aa1050c61e4a58216028ea84fdf3c8d60076cb4c03b9ff5088ac372a05dd6a5017708bfd197e397e6bbc336334a0af746af08553bab3f0952934be2415146b8ef52f9354daa903ec4a829875726ef8f7a47879b4fab (encrypted)
Stealth Address
9a6f12bc85930ef9d51860b50dd892012386bd9eb70623262d85616344862671
Commitment
30b71457fbff81d32f90305bc10364a866d1d997b1e07936b33ec0b83a727419
Range Proof
672 bytes (Bulletproof)
Memo
1b7c195a5ed5d95945dc92fbaab9e05075c5e0566e73f96e7e6ead600c85c3aaed5912f274a92638163ca95c3b7d49461818d8e9a6122a69743da38bad932c3d76de03d5fe43a542353ef0a0e6ad86ed564115cf8b1b7c451fecd965aaf16f77f3f368c4e8836c23c8a9dcc38405ab26ca60327b97dca7f7ee882a41a1ebb838 (encrypted)