# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be4c4ee1f841cf95ce176bfc13a97f96a1966b46f7de38ef0ab7a48f9d87ec4e
Pseudo Output
cac8ed86cea90b7a9471e42783c75e6bdc7b241c6f671a65e26323a232b06c4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
949326981bb37f2444265b454f87ab34c5023503bd644b1b459d62432d2e9166
Commitment
3a44912f14827ab6528588bf76f1a96c5357a8b11330d1e582a3bfb124eee621
Range Proof
672 bytes (Bulletproof)
Memo
5eb42cccbbfacc81d2332654add5640022e55020e506b32d637630f044513fd3c47a3fd8d24b888ff6e207733a7fffe202c8f782b9b0f95195b9cdc17a60f3df9d198462c32a1ef84a2d4d5188eb4de2fc43070c6d1ccb0f128f2af1031c9905ae009d2a80cea96a9f1259f8016615358689292c484ac7a91f5862b8573ad8cc (encrypted)
Stealth Address
74ef3904caf50a9792dd6920b73b2906ca4d868d52cd1b5110a4d0467890be64
Commitment
44cb4b32306b65a18d5b264b1d66ab1b189814762a3bc7d4024efbdf45c5d547
Range Proof
672 bytes (Bulletproof)
Memo
205e18aa40b03dd944a06004a67d741854dde0e846e40799311c36edf8cd42bbb3890e8884d87bfb0440c31de6731dbfaf3caf5c037999ed0e0e5e90a9e85f10019ff88595755993f953265bd55945b2fbc65a765bb59daac6e15cf44e939b16af121ffeefa869c21beb74346f2927fc16f300d421fab0f21651b381fa69bae1 (encrypted)
Stealth Address
da17aff5328571e13d7cf3baefa4a13504f1a24b3190898e793511ba40643827
Commitment
a8531dfdda1a3c38b167416aaa4d3880027887b3b66b0842b72bc8b838b37f5e
Range Proof
672 bytes (Bulletproof)
Memo
459f32090e62b83357fa50840f7f1cc674cf04b0b11a0dd69961a51ad6f816eabd0f2a61f49db60e3435e9d6d46c61a1cbdd6f5ee95e917d9c0b42c99dab083043fd74e63f236b20bb9aca06f534f50ead5e29b150b52e695b5355f26a5a91fdc560299b671c142051476a974c651bcb70d44fc60ed75305803d784550f88ee1 (encrypted)