# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e234f2ad06ade8080b5e8c0cfcc2e9f32b8e3b314b615f91904ea455b7b37107
Pseudo Output
ae1cc93ada4decb30fe61378abfafcc2eb1b44cf9ebbaf3c43dfcffddea2357b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d09372b3a2a865f73bcc3795488e2435ce2765bd3560e6e4b47055af7f7a3836
Commitment
38ea77e5829ea0db6f6c7743139f05808f0b78871f767593610c52db60d0a530
Range Proof
672 bytes (Bulletproof)
Memo
b1c2c728e42f2c67f1da4fd39d650ea51c6d7785e88eb87af9621bde5d1176bc385701ee8187c9254d8229551ae37411b3d26f1c8fefaf56e2ebc909b253da6e07d0e4e9c0b338757aeed8743389257e18366ac43b767feff7e58a9e9618050e65b07ca08f93c029005f3417e1382d2f287c447fce7588a4024399ab33ae5575 (encrypted)
Stealth Address
52e3b34d9e3dfe206b1eeded444e2ef7de059f90f956a37dc35009662e494d5a
Commitment
3a05c2f50201e96014cd844c6cd5d95b0a8dc52ddd9fc308daa673e65ee7b658
Range Proof
672 bytes (Bulletproof)
Memo
1a64ae45e6bbedad0f4c5e80eae6b35d2c377be04c7ddc72c3afbd3960a96203419bb15099e7765928f47365569b6bf158db4450b165744ca0dc285f559f3c1d20f70110b17982ef7595833f0b47bb0ac5c1170e9232f525db39904210aa7c571855b972f43f7aa4b05850b2dcd2bb359fdefb012ff0ec2398396e223582804e (encrypted)
Stealth Address
66893734d246b8c87c812c763bf41cd4051e1b26a32a800e46787666c9272e28
Commitment
ae5ba2256dd3023ef1a96dc13490c5f28aaf491e9316df55dbbb58040424ec3c
Range Proof
672 bytes (Bulletproof)
Memo
7e85c4290814ead44ca26e0495f045ef2b3479b4d90d0cc326b7f679a2ea54901f685b2254b5d74d2fff671f9dc71259997feb62a2bc9a5f26d88af105bc7b0e82b937401bfb4ed6d45b2a11f99dc1d86f29496b33e78f63e303306392709725eab44b051956df6f3695ab5ba43457e98bc60e887e7b55c80cbd8833fd314a80 (encrypted)