# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38effe523155f6ceb926caa37870e1eb901b6a04babc91f99ce54de962ab9431
Pseudo Output
f4458ea881c522f9f691593e99847cce038b31086a7465507dd7b5cc66bfc412
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a142cf32fd0dd23fd445aa4e1b4c5e62a4413aa8aeef9cf0a2be3d566c52d53
Commitment
3e4cb03fad405b3077837f2781f2e88da8b21bafd173f1edf0748b100c6d083e
Range Proof
672 bytes (Bulletproof)
Memo
f5a5fc008bf258b271922938e66711284f51b5263dd6671f74ed5910b52235c7b5e7ea6b067778764655848d635d6adc35dc7bdb7b2680a38b5347887a1d2de62ef4784a6fbd301c79ae6390f51af9f9e1a65029d3f3e014e1773e6865eb87beed4b5e71057bc4626be8fc0b6af9773b005860f14923101726fabede6a3c125b (encrypted)
Stealth Address
f85011101d41f695ac7ac2376b5bd8cbe94dd9bbd7a9e56a2a27ad8a224d0f63
Commitment
0a70c3f044411ce6457c473990e420eb10a744626ea811be70754efe5005ce07
Range Proof
672 bytes (Bulletproof)
Memo
b9648874312d59119e103a323ccdfad683a9f5d25ec416f6771a83e99606490a335a64d67fa6c7f44651acd72602632d16d0499f4a6577519a27e1e32018a479df463a821178c8a9d0e47d730030418bab584049810f66c057c00e0ee963ac0f30e97fb3ffc535f0ab69cb1c5b704c260c7d60aad57bc00380ebf20884241e1c (encrypted)
Stealth Address
00f0c5fc57a14ade7e3c1429989b447184abddf9d0c3a328a87925b6e70d3550
Commitment
d60df5f623dd6e4ada0008c550a22c996099e9c47679fbf8dc021ee6d0eee247
Range Proof
672 bytes (Bulletproof)
Memo
67742be1d7cedc435e05387562f2b9214acca67771f5cde29e44967cc3077eb9c9ff1ebe243945d96a800d1a09886d8b826260a8b7d6ef1fce3d9d7ba06273cf7ebc09d7883a6b264fcc83ef37e3c89b2353c15af3f410270c63daf1174974697a3f1086ad7eda1d7ad73d89ded9346fa7060cdd1ada8797b86febef460d4432 (encrypted)