# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c200d8d37332b4e2f0d95dde2eec60a7cdb0d5352a47ad3b3a90b0ac6535009
Pseudo Output
1ccfe5cdbbda4079a4264b77d09b980347e36fae538e0891a150e93dc9dd5f7e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
989ecd9c3ff2e258927ae2fae7314ccfe29769ac3322a824462e431358aa5d4e
Commitment
8c08b27a8da72d291fd819a3e4c0b74444ad34c1791c26b2d2e67f06205f5d5a
Range Proof
672 bytes (Bulletproof)
Memo
a0488346915cff719cc5b54b082b11b7dce092b1519be832f3459ba58f2e4febb7767844ac984c3e19639eeeb7f35e32c386b0a28440b1684f409c2199a7eba2163b9641fd351228fe0e5f303ebf28272648ff0379836efd274a7c19321d039437e714bb620508440a1bb197ff8e0e6fbc56633b74b8d7c8679a71cfcd17c151 (encrypted)
Stealth Address
f267917d08739d426ea4bd576349e44f6bed0dd9de2c3b6022e8ba9bebf3616a
Commitment
14e4f00cc0b0c67c46aa8bf0a2f07d4cf366bd0e906f926a7f7f0f59226f1713
Range Proof
672 bytes (Bulletproof)
Memo
6dfb3c2a1bd72ea976cb5cd6a28b4a16fc3e9485ecb5feff45f0f2a2798abda4abb5074845de1f647e6acf77eb5fdb581edd4e8c10efc240a5c50416a0e44a51b775c5eea6b39a60a75d2507be3b0ed9b84fa4dd1005096f29dbb56fcc05e9b9478033bb05bfbe1c2aec69715fc7c912ab7edfbbc6affeb397895df2197f0cbe (encrypted)
Stealth Address
f25b10a7aad88bb78bb308f289edaca79b66b2265feeb10ee2cd425b1b60c61e
Commitment
989b5876f0a103d8c7f61ea6525e3d93d353d961514b0f13c5921826c36efb53
Range Proof
672 bytes (Bulletproof)
Memo
20ef246720ef8ccded7df9cdae09b8a738d67062005aa01b369ebf6642ffbd230bed3014987f2977e58b83d6f8646436418e1d2268ed65e90889bf5e941ddf0ddcb4b3978739ceec6d7268adba70ce2aa9f1006f1bc82fe41932e35527be58ba701af71e32e8c467bb7f53d2baff8c6fe9da1ad5a1115fe1124ea0836cadb710 (encrypted)