# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90d4a194770f03f2104579149ee5c5aefddeba3687f8ca285f142acc991da814
Pseudo Output
ce0d81d38ccd537f5e4b62708bfa89e14a52393425158e726d8ebacadf302314
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e40461342f417de0d8901ec05cb29cfbd6d2cdf683e4713e0dd501503c7c84e
Commitment
56c43c3499ca5b966d7492fc9343c4de6a33621c13562a3455598b0e33eda612
Range Proof
672 bytes (Bulletproof)
Memo
2e362ea00f5f7225a63ad2ce86dc2cb891427ca42eb76031464c286c4b834186b5dd19ac4d8b9b9395b510cb0a7fd93feade23b0b9f02ea1e7b5de70c0df7a33ecd88c0f64dca355f9421f44d643a7569f93f5ffe734a34355921a5a78a7e424a973a7680c276f085de22abb54d45c0eecd231d07c985d5f3701122058461a79 (encrypted)
Stealth Address
305184230128a08eaa187768593e09a3457393faa89e1e48659bfaa5cf4b236a
Commitment
605989e859ead11c62843c8d9a41d327389a9e7e64c1603e845ebadbc7bb2326
Range Proof
672 bytes (Bulletproof)
Memo
363dad5dd207b85aa9359cf74fa55e2a5314ca0535815a3d7afdb47d4aa1630c909390efcb5129eb2e439e8e558d9bae49e5d0c428cb1d17fc5559070f1b53b3bec0c4ae2293b35dfe28b1c74109d8f6c9867847b1e45c266df70098df4c49db688dbdfb74d85059d4de0b424e93a2f6457ea8e6a4b6b205932daf4aee6c889f (encrypted)
Stealth Address
727223e062fae69f158538fae8ff0d775e507c68630dc4c94f9f05934424ed6e
Commitment
3af21bed9bb7e74d464426524a0f8c0a9dbb16d9b301c3875551aa53e15c847a
Range Proof
672 bytes (Bulletproof)
Memo
768a213cd7e7e7d7c3b3dfc3e6c205c154c27f5f264445083307c36751ff4651d9d08fe4482d14aa5ca06bfaa750642303e16ba9cd40b1b3715f2c3ad38e0debc690d0f956f397367fd4ffac3411b405e32fda16026c0d473e328683ce066c8791d8f7c04c1fa9a50d911a9928f9474375f487b3fadb7898e7e15d0de27bfc3c (encrypted)