# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cafb728b447af291c260543047af7c2252430063c379bde0c054cd0c024fb726
Pseudo Output
fcf1512441ebe6d949537211a6dfdffa9d997c175ddcccc2345e1798d0ca1d62
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fc4206d91b6d6fcf079db48f82a858497d2ab09fcf24e9eaf642c14d29df9860
Commitment
1ca64b7a2e5105c30360ad3ef28a4c68269c89097849d8faff9c1e2a44b9d406
Range Proof
672 bytes (Bulletproof)
Memo
cfd2784365fb70c9fd0ba8d47097be80bf083a3c698de37453365b5b93e63a456437734a51d526e02325651033365ebe3dce3e0a224dd030db0ba916506d2c2fdb122f0e7857662ad0559555b1b7b7b09a67247848b7318b7be75ea13212ec60f88218a9b3b510b85d2ffd45b9d657f4aae4247842de0a51be54eccd355155e3 (encrypted)
Stealth Address
fa1be12ed0310491cebdaee8b6fd165eb29789bc39b2c9d153c2dfb3e3637024
Commitment
aea989bd342a38d210b56238046e308e2fafaa958e21c11cdb685fdc2ec4de7c
Range Proof
672 bytes (Bulletproof)
Memo
e61895ca42931a0c2811175bfbab0a67de935a08765100bb0a4d2db82c6066a87d969a7238378829394ea1368686b422f4b655ba45d283cdf86251a03d0df705879195717ca4f8120861120bf543136daf92bdbe82f9baaadd890f3cf0d6808fd839b68b3b05d8ed2608effe1d03a871cbbdd16e80f0516d41591e9fcfa14ff1 (encrypted)
Stealth Address
147268f51a049df1dcf5aa58eed6a3270ac3df19d7a3ea85e1c51f37a605bb73
Commitment
dc11870ddea18b498067b6d1a75b3c24f0cf279fd67a57f75e74f74921494839
Range Proof
672 bytes (Bulletproof)
Memo
442392a457f3cc43f257d6f1395ec5a0f45be4f1162c511996653ad73fe9b92e9f3df48d36484ffc726231fa017d42816ea0b0e9fb76aed3a47b4960e5c06ca86c1ed293bc03af24f96cbffcbb3508cb2b6c59cab603fe8ff02b90f1d8eeb1afe864563bb1c27a325ff769a87b152fce17d88e3adfd92e54088ec099fa0be973 (encrypted)