# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b438e4b4232ae04f08219ebe5a063c7b2cd224a20cc18a2f76afea2d43e13522
Pseudo Output
f62962f4ada236a85aff74b24f3bf4f22173b31c043439c82e3363f40ac1e655
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a59ca3630945105c1907bc1a1a215e7bec1c58b0416341cd1b058f216a21e7b
Commitment
fa1a973840ddb111a93cc8d656e64c6cefad6d53fe622f8090cfb905ec90aa31
Range Proof
672 bytes (Bulletproof)
Memo
7873e71c295a7584a1a9114528cf438cdf597c8afbf97137ea23a1446a1e284859b82ff9e6d7060d81d0c71564c62fec988dba7612b9d6503bc89dddfa959356461716d0ae7c5fc000723bd2b0f5675eb343ddfe51bc2e0b0ccef14cde7305101ad6501edcf4313e84906c16c6702da191512a272760ca96211083a2f2b21eba (encrypted)
Stealth Address
cee8971485d6abd85d7b8f42aa007b6097444dac782e3bbcab266e5598aa6a47
Commitment
2c73a20d6e96510e419afc015f009c150ae7d88a733bd724b675023a80efa516
Range Proof
672 bytes (Bulletproof)
Memo
da5c40a1564b45081d5e6e1e5bb377b1e769ef491eb3aa8c70fcc482260298e3aabbc76ace49dad24e99b72cfc68dd2753139fa45b3ce32040ce5de9660c50d2354171f5d637e24c94e24d448f9e104e9258f6d3afe3b45219e23c67e396347ec2769b4f1207e41aa46b0524cebe25224bde3db7f0d97e0cfbb6ac64fb05e9b9 (encrypted)
Stealth Address
b423f5e39b00d49c96e207e2820357c851f99987f04984847da6007bbf4d4372
Commitment
cc16773ae1ce5e02e667c41fdfccc85450d83e69b78465130fbe335fbae4c037
Range Proof
672 bytes (Bulletproof)
Memo
c4981bb05081ee81f8411489ab898dfdf04a37f89f75d57d428df88bbd14f18eccce68ab0106998b78818caf679c3592223f6a9656c80c3161082eac2b4a72fd8e155dfa64f0e162c97f9d17ab6303be2d1a2b862cfe300501024e1418ed0744a4ff97910a8bc13d4d276dca29d3317ff908feddaced02af3c5da1352e5a0b3a (encrypted)