# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3abe0eceb1db8a0d9c95e4d9505a3c328c96d2de652c4d8bfb09b1ce71f15b45
Pseudo Output
96f465e4c5ec21c5d6ef0657d67587c74bee6b6fc4fb383484b73a9fc7819b20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eaca9d8c01dfa95e44e533f0553e17ba92f684c74289641a94b4a2cf98f16b2b
Commitment
5ca892e7a7b7e9ddf55fcfef30331f357d629952a443736978b28a728f875b5c
Range Proof
672 bytes (Bulletproof)
Memo
3c07255c99bfe39a5fffe01058d42b32daa03d60e021833af0f4ae97593c4873381d3bf2bdc4df834591155c4cc417a0ad72ad20e6366ca74b257b2528f669a01cf1a5fca3343ee6bfb1b44ea21e889bc3d0be1b683198d251414738d62ca2ec7d1ad4739ca83cba4b4f27d6a127b8ed0ebda7788ed162d167a1f03cbb7a7eba (encrypted)
Stealth Address
ca07c1fbd46cb4f5da1d5cd554eb581467a9b8cd9efce87320addd0f92c5d141
Commitment
0ad8d76920db5f2fdaccae7fd35b1384121c2e01cf0e4c53086cee9104ea9346
Range Proof
672 bytes (Bulletproof)
Memo
5ad40b0321c5fd89e0df1b37c49462616b9ef692894153a06a907ab4da7f16c944969bffb8f1e640de4ae6b5713880a01f66d33903b08af85953415e32c2b05fb8e9b1318026f756866adc454ee8381e7546ab98aae4e6a404635bb26c034ef9ae6c6baf4075d8f3d9833bc7672484be5e0cfe60d8677f7ebd62a2e1a4003f08 (encrypted)
Stealth Address
a4f6a733dcc11ce69bddaed730795485d26b2419d541e8c97de535475f950e31
Commitment
ae1ce800d4cd659e986555e1c05f0b499a2f2fd773df9abc016b0c0a0132ba7b
Range Proof
672 bytes (Bulletproof)
Memo
320f977ec2b0b9bdf6d639802ec01967d48201e371d24bdb892a92b36a8dadde4229c95ed2dc917a56bde475c3714bf5353283c9a8cf8b3e694e8bb85af37cd1cea3663b5bde05fc602e9132a7c2509ecedf7b956933d0be23be648efb9c16f4908ed45b04adc5701d3e195971747b8b285c51df668356e727142bf942f177ae (encrypted)