# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dc54e974713fa2b8743354ba9adee2d62445331f35dfb670f432cd1d57f18217
Pseudo Output
6618693e8692f10a6509921e9e9ce679bdedf852b9f3826d355e494133052d66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa82407c2872120e9cc96c53e8724744788a91d42aaf3c4cace254396f067560
Commitment
8cdff6c7fbb7b6d9d3d2a90a693dfe735d33c8d3aaacea34db74c8d960b6c365
Range Proof
672 bytes (Bulletproof)
Memo
c8fce694da0cdcdcee2aed5466eb9fde93a33dca98ae1bd8910b21466be6085b2af8a506205a7c6c4dc8b50270a01f2b2c75422d51e948cdac39531390909481edfce8200ba19539dafdd79963ad6e136392bad39c873ab92c29c33cbeb0aca5d38ea1cad2c21c2988fec5c72611cb57205fbbae7da25745072a2ecc1140aa27 (encrypted)
Stealth Address
4c6f627eafb13db2d99d4f790c03fad8d01e1a582a7d5389796240b983167122
Commitment
1c7f6ecaaaa0f0a25681b9b2b50b5e5ffb3a43135d810ec5fc04e72d31380177
Range Proof
672 bytes (Bulletproof)
Memo
0129f3dd98b81d03432efcba218e9fa660994f4b8904cfba19c88b5496f8f84dc4f5161dedb004fd78743a33a39ce2258d2a28127e03db3b5b64b2c2d8bbe20f971ffa1cf01cd5da78d202afa0e876bb34e05dc5933c84f0073c626856255068981dede9d2200e65707c4fff841128bc3d4434232ad2df60c3b46de8ff10560d (encrypted)
Stealth Address
d6dbfe14e5ef1a55ead3bc129b330bc554957fa8d7e19e04163a058497257b12
Commitment
d68d8e8ede79212dc0a6e486ba54f49a2073c9a96cd68d7b829ac435bffe2c53
Range Proof
672 bytes (Bulletproof)
Memo
eb2e92bdec0cfe9c918fc5eda9c9f87f795fa5d2ea11c393b4383c26dc87940a19549efe583a0feec69fb088017af566a4de67e14ed91762baafa060ac0db6772939f782ca549c5f503c68d505f9ded1cb06e7db58389b32c1fe8f77f7c004489c5d9988f75aeb65f5bfff93ca01d1b330fdec78391c8aeb005abf80b3c3e3ce (encrypted)