# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
609ca97b4379d85b045c17b8cc4c459a4ca19eee079ffb0877a3c26e415cba6a
Pseudo Output
98d9a61efa143f7e5491b60133b23d89ecf61f36c9cd375be05a7b38f5757709
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fc1b8353fd5355b6766536d505815bf87e4efebc4a1f38f22054982f20600e7a
Commitment
b2ca6a70b6c969757ffe2caa8e64a95864d338542944b96cf03dd6b0fc67432f
Range Proof
672 bytes (Bulletproof)
Memo
3fc28a6c498c776e38fcf2ffd3ab67d7d478caa27d424f223995c99dfd80f6f9d879ab539d114d3967778a96bffa43d9be5f9f390fc05e2263e4dfd44e41d9e98f1becfc4d7e0e064605f6911f29f4e04ab4b4edc2f14b61f4b9280a0be9312a92da0992ca28c684263060e92218c21d42fb0841a225475a900155f7f4dd5fbf (encrypted)
Stealth Address
984582209c494cb383563ab17f5dbd18b01da1fc59a9e0430ffdfbb509877538
Commitment
2c65de36ef8efd18e78d25174a3ce2b72ea13b3f5b5e963c47c7022ce11bf031
Range Proof
672 bytes (Bulletproof)
Memo
c4455567eb2d43cf50870d94d5b5a35d4cad77f43a9a3c077a6ed6018b71f47792f7a26635c6ca85b8c0db247020bb3f79d9faa9826b524f1494d189afbd410f75026be959f03c1098a984c57071e079b5c9ae4a58717187b1ff03f15a056b359a38437f9935b7870c8fa09df0cc149c4c174f3be10120b13e3f8c3a55fac5df (encrypted)
Stealth Address
3649320739c63c99d1daf51245f15818b585f3bceacd8cbe7a901b9fe670de5b
Commitment
8804e45ad9dc5c1873169b5099133334e1ed7c80fda19c482faf7630d5ef4114
Range Proof
672 bytes (Bulletproof)
Memo
5c6b3e9de7a1feceae56959c880dfc88ffaecf06b5d8c792ff21fa4d437da8aa5438114799c16ef39708e4c488cfd693a7629142ed4f137d2d521661895fdf19c7fed9a08f32349ed3324959ac2340a08f293da09f671785e4c45b21796a85cd51144a52d535e557de47d230c4f00a5d3444f2e4f7b277ee2b0b29f1f12f1ac9 (encrypted)