# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa9ed6f7f50843c89d8678e94b3e15213ae0ad48236cbb12d4867e6aafbf5e62
Pseudo Output
ac7f7ce6c4c847af1111e0a62ae3291462c09b2c9aade599f50463c6fc8cca73
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bec95e8be87ceb8bcb2527e38111331dc7942f2762ee049eb92ecd3dd868b35a
Commitment
d64ddd5df3a8a29ee8ec3b85006a781b52972ca21fe54ea3cf5c525efb97c730
Range Proof
672 bytes (Bulletproof)
Memo
7f25a8941470eeae0ae86df9853288bcf600fe458adf2e6351ebfa0fbcaa5f569747d252ac37668d4e5518e2b9dd81e206d57e06c9fb27ad2c4989db8eaa4d61576c4447424f80678fd2869ea70a1ae0f2082406604b2a5ab2cdcd79bd69f092e707c28005f92995646d2162c26ded9e6ff2b5837f7458e2ccb24bf29697793e (encrypted)
Stealth Address
feab74f324359c29155065843ffd570e0d2afe78c394052774b71e6fa1717877
Commitment
20e3c05c95d26ed297864f32d041947f8992aed9cce7b563248228a646c4d550
Range Proof
672 bytes (Bulletproof)
Memo
8893cb104000ab014a35dc130f26239c026ec06c6bc90b0248fe5daac7dc86db0328babf5b5eddb55db11fc7a10db45b233b77d1f8a65aca83aebc28f20afd87b1d86f8f7750345be8668338c23e407bf7b61a2147da7474447f861ce549072e8fb61dc3906e5c9c3b8f8a28afa8bd284c62eddddf4b68f87a81e6617568ab81 (encrypted)
Stealth Address
0c455a8fbb04f161033ab68f16d0f24e93ff93a46a262212e60a0cab50474a1e
Commitment
762a8f5c2cf64e53e33940762f574c9a129229281a7479fe925004ad2aebbd25
Range Proof
672 bytes (Bulletproof)
Memo
818ed2296a055dbef3514f4d90af06b6e85a766b3ed668c35a561083d9105a18aee77c62ee0cd69c765e34a749564dd259a56c1fafb2855365826ed16518c7f0234ea71db8b9c6b9ee2c353d3f5a37f0983a132d5d6b83b30ec68b825c0e00a071587c227606e4e6683b624f9efa0a1cb91ee90121c66b468f68b0cdf2b7f211 (encrypted)