# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3cb29e002690ee5c77dbbff609939a7c6bbf5e0795a9e7f47eddb9c68a456250
Pseudo Output
b8a92de1aa7c8490f238dbc3be822da8eb0acff3a61c4771ac0ffe66929e1912
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
845583261206b7f0d00beced8fdbde40aab8e78f9da2e1a496fb476915d8914d
Commitment
9edf115e170a9cad67ba89a69d140b8fa2566381c185a54982c59e80ddf69609
Range Proof
672 bytes (Bulletproof)
Memo
e02ff0656ed9c997b516c0d9306ade08840049d24419ca2035fc2d951a15ec5e73ce41333b00fc4ea377617c7c5b9e9bbb1f39f1ea055c830a30446256fa7f0985bdb21f09d67095b078b2935e482cadbba34aa969999f4beac9e94447ee1ee80552f406d295e4fa2073cd05bd74ef8a77b0d258fd0f914e7cab02e7c4308cba (encrypted)
Stealth Address
b2f5eb21a7e9979c69436d46dc371257f6873aca5adeab62dbfc83a3c2498102
Commitment
92ca83a13781b308b53d0e53f773d1b9b3609f5f2d9ff3b8f74bdea1b1cfc721
Range Proof
672 bytes (Bulletproof)
Memo
a842c74a98657e7faf710c3d7c7c29ec586f1408a2b6b8c9285a4b07c38179d175575cae29660c7a3f426b3bd33e020f914fa3c42af48df4061e887c6d0b7be645234cde50be74092d732460a2b48247ece7ac5e499dff65db04c5e4ce47463c7bb6c9a23d313e9100f1cfa495cf45a1a0d3f6f014bcb95e1013b2ae8d5b05ea (encrypted)
Stealth Address
3a57c3a694181cd945f3379acdfd6ea1ba5ad061ff20e8f3e040867e06b90835
Commitment
58e3a7fa20ef2d2281259736e92e3b5ab980f9d6ef882455040a8ee2a2a4932b
Range Proof
672 bytes (Bulletproof)
Memo
b5ca3767ba8cd2fe6730c0a5f50218b57fad8a8aabf3e1f979ef5077b716d2a3fb4fff67b0e40e8ca8433d4e32b5ff70427728179ebb521fd83e46fa57643af010996719fa11791f1ca7637961ca2be2b1f20801327b0e32b41ae49986771b639e409b9d30f02a2f75c321ef5c4c2646102ecf06e72e5512dd23a24eec93f05a (encrypted)