# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
14319321e1baaf596125a44cf61972306f9191725bb2a857a4aa748aea65ac69
Pseudo Output
1a0434f6c91e604649f121c74a35e919f8a921c393ed37f27de68d436c610f6d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3693863f20b3c6f78d920af2f2080d7b26be10878d9d9980cec28c826fe22e2f
Commitment
5ef6750b6a5d1861e09185f210c06be75208e8ee3335947fca1e1ac5feb7125c
Range Proof
672 bytes (Bulletproof)
Memo
0ed2451bc12d377b4cac4ccb15a9fdd4601507154f271f8af45f166eaf710cb46dbbe128f97694dc57631519c3e1cd8c12c2a7d3581262bf4e81b7bdcd99ca0b6593f83f078b3a15d8267eed9b8caa03c9a6b4168ccd995b7b3a75b038bb1201a9528e4231e5944a7d86e345957214a84326d203e8784ead8c088c49eac0a01c (encrypted)
Stealth Address
cc8c7d8306ae1fc3337c41d91147ec91f8570e4e154a5e96cdad034ef40aab01
Commitment
909140e1cb69945e6c0e2c6d7591daa6357b7fed6d923610dd45b852abc45710
Range Proof
672 bytes (Bulletproof)
Memo
f041b0b17168cd2b56a4163a86caff75c2cbd9f56547f5c6bba991045c608467581b44b09f562ab003c106db134f960fd4a41f6aea18f7b14f0bfda9bd3b2aef23b14c082cf2f884a18c7a514baa2ba2b1cfb0ddbeb76b9605dc1829837f851e32c613f9820084eb26dc2ab9f51d46b7b15d3e26b12def0c2d1c41b4bc361c6f (encrypted)
Stealth Address
8601c9d24d98c2f6aad1123d794830e1761d677ef352372023f50d6dd661f726
Commitment
0267c00319cdd986e7ea9cabd9c2280438a003f5c3402d2cebe9cc93fd35b448
Range Proof
672 bytes (Bulletproof)
Memo
4bea04ae8daf525bbad1d4b21d03e94a0ee0db9aeb36bff52cc1b5c03227fd0d7daa8739f7e3d551e8e13b7280d2fe5a82a3838059b21e04fa1723f403775eb53b1a1d66e61f9f6c6b6d71f089ac7676c2fc97ac0ce322afb7e144cc86dbe2633285dec0345e15620cf0f826937dcbb73e14ae9a6576d3d8f935ba4e26cec125 (encrypted)