# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ba964d85fbf78dc18dc4d39b15c46d7a80e54c25c9563ef4d747b26db9434375
Pseudo Output
84adbaeb44d6b8b3a31f09d54b5cb21f865aa8a45203aef4663a381a49e35938
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3695b4d9b377adcbcc08e94bdaac3440f5ba5f04948bb7cf909fb998d9edf72d
Commitment
8c344d33b4748dacf94cc1e0d024831593deb52463a4c81e4c5b70343f194701
Range Proof
672 bytes (Bulletproof)
Memo
b2937c3286630312f4eb047c78d1cfa9773a38bf5c80296813ef7cdb5181e4d5e308ae10fcc74570eff9540ddca11d4c45304e2b0262ac7a9dad4f9982a7f61111dea5bc5213cbf59ccb0e252f420cf0e6a061a7dc68ee55de403b87b54b42e29e5970bdf471f749b50abe85a3e8b4b4c88118c175ff65737dc488d89d2f2ddc (encrypted)
Stealth Address
96191291034d5ade78ebf18b68510a9e583f462719d4c06fe97622631e092838
Commitment
98a3dedaaf1f04742f8c2c15e3e4a169841808da37632151d8748762c2409a46
Range Proof
672 bytes (Bulletproof)
Memo
ec22663adca5c774ee9a1bc518f90fd8346932ffcf66719218acc0455ea2c13bfaa9f7e03eef33c014c0715d683f9803ea245bcdb89da7d9d35cebb4653a3657866a6b2c31ee2572ecec19dc42b1bd7c05b99bec45c90a642e584efda196422000b9cadedf6c8e223e5ad92a3d4e40868994166134d87660dbcc4037117d25ba (encrypted)
Stealth Address
7eb7f9fd957828813ec0e80bd523eae080a46622208b18761299327eb6ec7826
Commitment
8a4f168024a040c89d946f3a01e9ad793b741009fec6abc23c9c35b729b73f0d
Range Proof
672 bytes (Bulletproof)
Memo
92cea52876ed4c5bbc827506f5f280e980f10e802913bc7d5a2c7fc6e7f9a36ea1b6a6cb90850b5d9c24699b6f0bf7c44d1a23241269c510232e3d43897286642adaf060d25b89619a6055599b1a0832e6ba329ebbe25f25225448f636fcd9471b294f8e3bc74926db636653c3f07af2baccd97df1d8c36d8eeb88fa6b683db0 (encrypted)