# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
824e76215ab74951926c7b9742793ee39da8d1462a0706b6871b08d94317a64c
Pseudo Output
d64c8e6db33e0042ff9fcf23c6e4e970fb4234f76fac925da4a990e3988c7918
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a9ea93983211840b051be0b8e3b674b21ad1821fe3928baf67fbfd282a58e74
Commitment
44d0ddc996d081b885e63fc0171cf299e47e1899559627523d73d14324904d39
Range Proof
672 bytes (Bulletproof)
Memo
782528743b3817acde70fea5460d3d01007b504145e2bccb734c0bbe213e5b277754e4a3fc4a168ab2d2fca170cc955b6b570ee67bff53e43409017f0cf200165468b89a8c481e026047249acc87c5239d65740969cfcf3b0e8896514db626d185dd275dcac142c0a26e8dba956b0c895f8f6986c24d1e44ac0d7c9405bfd409 (encrypted)
Stealth Address
c6d97355b39a1a5147098e64a4abd7d1d0e688741f0f10d2571fb510482a670b
Commitment
6ec39ad770b8b579833d7049643ff25bce92cf9a3a164831c26b162d07c54840
Range Proof
672 bytes (Bulletproof)
Memo
995cd02f308d783bdd1126c5797bb3d67e8160571d7d40d08b30a5f58e2f0c8bffa28ba35bff380b4bcaa85cfaa5575c6caa40e0eca64a072105c0e7cedaaa6b9f3cb18052d366bab745672a1114d87d27090002e5b9fdc43cf0d568b1676b422e84c30aa1e646ed85157437ecfd409811bf56bae1ce1421dcb7ed9f940a435f (encrypted)
Stealth Address
36d12717480c2a4efa31a98f5e4fb6e2dcca40da747e8c64711dfb201d5be018
Commitment
824d17ad79e50fbe2ad639aee0e7d4fd65a0a041a9fb90478d58e79d328fea4a
Range Proof
672 bytes (Bulletproof)
Memo
99a6fc9b5721849e4ad09cc70da8d2137b81848d64479a27c5c435ba74770fb258ea6a0118a53b4b42a70f1fe86d82609656edbb8e211bc5ac99931b28808830983872d01132f31e8b6c0237aea384808ff56ec1591469c454558dae816cfed442683e20a8f8a8fbe76aba891bb46fd23fb91a4d52b0ea9f3271d5cab80dfb4e (encrypted)