# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c78b4e8a006378bea9812306eeff1a6eb0ee99ae5e5a4705baecf1c4b89f209
Pseudo Output
e682aad9c0f17aef6146175e7742102787236225ea328774c65d33a29ee7f81f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa4a5b90ea8a59d71e01479a55d2a02e89dd2f8062bdfd38f54ceb7688c1c369
Commitment
5675d98d7c8b484027ec8b4a385feffdd9f7afb3f6c729e5a27c81d6cbfbe214
Range Proof
672 bytes (Bulletproof)
Memo
ea7d0ba16070c34fcb1faaa2860b5b2deae6e32b06373057b97db27737e50cad709f43e97723ca9c14f15cd6ab235d7e5fb78eb71c82fe9dacf92d6283705d77e2fca78911176fb7d96c2effb21683a9f60d3b4a2824a44f563cc49e1f5965ca95a02df6481a425059bf9dd640121a892513a5a89ceccc20562699880b68000d (encrypted)
Stealth Address
787b17f367f5b7832182b130d2f9abe5251335647e19917e2a95ba35fd1a821c
Commitment
9ea00185cc95ce36930a50c4e64869769b82e9931066968435daeecaa2872d0f
Range Proof
672 bytes (Bulletproof)
Memo
f3bd9b9eaa8ec926d2eff659a786b3d39418296fd5d42e39fa684449bd00fe81353ea91fdb8dddf8126b635d46a12442ab59b29781e4b86f0937db79045a488ad1f1874f755d352f2a3520e5d309e70be8d5ea2924b1ff00294055ca3dd8062b9673e1178fca0d3075cc3d09327e3f2830eba8f4b36eb9a7cb20c1a25874a4f6 (encrypted)
Stealth Address
ce8afae287a708b8026d972affe23adab3d03de2c50b95125495a2bb41350b1d
Commitment
cc5cee866311daf451a21a77fb1c150c597774634e65cf470a2f7cb48fb9055a
Range Proof
672 bytes (Bulletproof)
Memo
139341e604c87b9cd2a35130085e87847fb1370cb58f16bb6439e24af3b941f510b59431760f473aad5ca1a4344cb997e3847f0314221c968807e6f6b54b4d247643e701f854973b4b25f5947d8b460d620e67fdbd98dc60102787fdec887be91b7aeb71828d9561f31c4842c6d8cb3f8d08495628346864d5d16cda84f732d3 (encrypted)