# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b28042cbe856626a400d059d36a4d03d2b537d7b69abdd6861fcd5ee89715f21
Pseudo Output
3adf63e3f5c6a12f38a33ec42bcf35315ce2906ae16e8af98d849c39a5906d6a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e036407a96c7eba89a85d48d097e3c7f0d77f65092868217dec0049669bb7e57
Commitment
26e6650e58cb0f59ff83685230bf52bd6332bee51b87046bca4f003582847355
Range Proof
672 bytes (Bulletproof)
Memo
342d41c7e356703604f303a619666d48e3c4fc7cdf3b5120a45e294ea8cd4015e4809b34750183e400f87b929eeb68faefc4455f0eb668bf21212ae15218bdfec1582be3638edc49da728550b5773f160adb00c1b0e930d6f509b0ccbe957dc940a502443253501b801170a56044821a572e1ff74631a85ff9a620648cda79fc (encrypted)
Stealth Address
b0a8967de11b09c393e9315c9720f83a5a128fd2d8614bf70630861ea20f151b
Commitment
681e9bf5294452ae65d685ecb930fbfcb2cd1a2c61fc8a87e348ded83f259729
Range Proof
672 bytes (Bulletproof)
Memo
79ab1d7842bcca99d0161f0645b5d7096594a44903f8421fadedb99d2bfc3b458593f9a3488809215d1d1d6fdb9ae1242c2b31051a3d5697498e03a906ece4714e0acb076bc4a08c5b0b1a00a9a074df2975336cbdcddf8688059cb954eaf92e7c7aeabf1eaa8eab4940215048c827d714149f75c26b63e0ef48120f8a06cba0 (encrypted)
Stealth Address
30ffb46ef2b347bdc94fa5fc646a0208d39bf21417ea15e65509cdd3d4e5174a
Commitment
0aeea96e36dbeea75c81340768b719b81d779a07c82427a994605c00efc7fc20
Range Proof
672 bytes (Bulletproof)
Memo
513582786c1b0cccf91baf2027452fed4c67f353d72e0239751431bd88f464c3aa75329b283bc63b97c58086f48482d92b4af519024e147275ee1c597cfbf7de6fe788484c73ce8ab30c9da5eb55912ea39b930b6565192431cc26e777744cc806e61b071bd2fdffb3aada1ab31673f7945f14d9a7079099bcb2bb24a0fb3bb0 (encrypted)