# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
26c9c78666b6d14a68899c447a5f5a44bb9ac1387ffe2224999e418bbf73d05f
Pseudo Output
20a1b19c4dfeabbd761dbfcd9a5a62aa0b017d30ab7a877c90fb3da10f61e03e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c23a3dd7c15120a9788d055401f9e8f4a449fdfa14fbde1672d7292ce0c3f57
Commitment
34c805e6659532d5d8d373f8bfa0f35c99ac9627d5e9f29dcc8a06f8ad18c40c
Range Proof
672 bytes (Bulletproof)
Memo
71ec1a9eb3c3172836b3d218c9e9665ee93444cbef0e4dbde03b1bf13933afb50d0db0856e9bdcc7509363a83c32ffe0b4d6573ab9eb4d3f2add00f720616b5dac65af0463dd21b4fd16608fc19fa36aaf414245056bbd7e8879388ae6196490c14c2b0cbe25f3f09dc8c79dcf96e716508756405fceb9e2bcec80e9c3d805fa (encrypted)
Stealth Address
88edfbb87c2751f6ef665d53b2547938a27391006f6bae8d3b999ecedf4bf52e
Commitment
f85f5166271bad516e0dfc4130318394e084b93a35990c962928fa4fe5523804
Range Proof
672 bytes (Bulletproof)
Memo
65366591ac08d35510bce272d2f1083bd97effd5e3a44400ea135001fde1b6e450098b34fadb4183f900afe5295ebfc0d0af07d8861cacb5956600d495406c39e6016cda443db16218114c649cb5ec7f0cb93bf85a06a5e3c1737eca344f7553435915f3f021f62e7d8ee68e706d32486ec04fcbeede7630e109f2322b2b9875 (encrypted)
Stealth Address
0c2f7652d8c10acf088a8b161e73f9a429c8a6d6a80f7987ccc46eeb5ba68533
Commitment
646aa1b551f29946b3dd0b5f12a521ebdcb7f499db3cef1612eb8a71a1211012
Range Proof
672 bytes (Bulletproof)
Memo
aaf9077089cd9ad02a53262d5f0339185be510e0cc5c0ba8553f671b6ae2b44285dd6f0892889c8ba87b331457b9319b15b27fbcf8a7f4b751d1067a842329758d86842b07bb9d6d741f818b7df09d61c766126970a5a8b9b1e1018424158f099405795b89fcb23099efe12895263acc7295319802071f0bfa4fe45a4aaeb453 (encrypted)