# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2294c4f6a2d41a2919d0980a5dc624fb3a4b338b100e9f613a8576f8913e095d
Pseudo Output
c0a2f1483c237bbe721e1ccecaf89f7bced8ea01cb1818bc44164356f5c5eb25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f482ca20007537a92369b31b8fef4fa4d3acf85bcb99e0d9fa505ea09f073966
Commitment
36008c9ff7ee45c6b1e5824081108a080f5bb78f0b01828ceadd11dad317a172
Range Proof
672 bytes (Bulletproof)
Memo
803f1b86667b869ffa9185455e0720c7473d4b93d55bdcb3494697345b14b61e4936e84168a6bb78082965253739343665d3a1c16f11862aa6c30a4ce9aedca6913196505e83c9154c1dbf0e2416b96576ca69486c94af9f2304993d6f5480e5cea5a1fda31543ffb03b79fadcc0da91d875484edddce5cc6c114af57713f68c (encrypted)
Stealth Address
fa525eed61280643a498cd2a149f4f23c915fd7e6c9c36ef649224d9070c0f26
Commitment
ec756b1db71e1303e9dd989e23818a4eb500bb69918eee7f3fe9de624df2da15
Range Proof
672 bytes (Bulletproof)
Memo
a56cda42f66d534c3da393b7c9772f709f14568180f2219b69eab16ca0effbe96765b2e9ba19d85e2e8c280fe390bba2afd136cfab0dcc39de6688944a8ead32b56ae36eea2e7bf9051a66307c6852693030ca4d385866fdc9f43c299764c9ee293767a52afc0d4fc5a4cebf0089fa0fd9cf9263f31f160391ca79a2f0fdee0e (encrypted)
Stealth Address
84d6e7925cffde44c31c3f7273f252a4c08c8810d20d885f356fe7871780ac7a
Commitment
78ee0b027fc5fc48f60e1df46aa80b7b3b182e783b81a3183d877a7e2ae5d415
Range Proof
672 bytes (Bulletproof)
Memo
977c92187bd5812802e5359db35357284e6a6848c2cb0778d438ee228b77826d6fd8614eafd80fdbcd953a90d679f16910c9c6394de4bdee9c433f95e10018984b699ead674f476d19e08bc0a5161a4714d48de32ad29a315326654fd74dc852b2177b679469b9d0e5c7f9671f31176b6f4db610fe496cd782a034002e56d50d (encrypted)