# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6a006c956aa578d3592a09f9bd5fd6b0ef81702b0dd30456e0aaf443b86ca338
Pseudo Output
726ffe58c9c9879f6de1e87c4da5d0481861028a3f8bb56183de44273e68b93f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e0b2c67957077d554f24a65dc109e70e54702c3217e12e4f46019c0e447a258
Commitment
56760ef129ac5ac8bbd23184f148a172ab7319745ef38975128165cdf11fde3a
Range Proof
672 bytes (Bulletproof)
Memo
d8109fc7082813bce4ce03c473ad8f1356425fe0c13f270706071d638ff850ab40c2044230c3beb4fdef92e1e7642f9223d5ebf54173c725b925ce8814b3d295a65e79fe930831a42230b43dbd58d42d383e2d3683a8cf4397d96656c65d869e7413a63b5771af2c2fcd81948df5e8b107e10a633d79e41a838c89640b5f7560 (encrypted)
Stealth Address
a4dab1d322332816a3e8509b53f7126c6235f1102af29db55e6e8be6bf52c231
Commitment
d0a635637462dae9b86197e836c444606c7ae88ea7e4dc64957d407b8c97a531
Range Proof
672 bytes (Bulletproof)
Memo
40a6ddee1bd4fdc48d4febb3ec226c65c253e69711b3fbc1a0711fa4a2e657ed2e8e1f358cc791ceee02c84c4c7c232f251407f2fc369afa706068337dd3d0f8390cc69260c4409a1b9c4f0451f8b5766743674a6843ca4bba3503813fcf3229a1f58b237904ec96da1ca86d50e2c188136d29fb03ee4f8cab01a295eb7e3c39 (encrypted)
Stealth Address
969ac7076eba326e506f3a1b6c67f30a12f7afb8ba82e6abbc49994864de004c
Commitment
909adc42fd04d37db35d2d1b757b43e173b417c1741aff66f8257af844fd097b
Range Proof
672 bytes (Bulletproof)
Memo
27ca43c8a3bc2e434b2561582ce6e21aa65af4afaef3fa895e9237dc3dd2925e558c51701d386f4c67caa55ee931345e285cb94dba47f1faafd7b1f77e65aa932f01c2900f71f16c34ae13f74e1099a2addc74976dbec0aaf847a42da7474a00e84b57ab87ae9a58f13e4fea1c3ff1d90db15fdeebf3a7780ef5817f992051b5 (encrypted)