# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b215039a5deba15f02da2e2f491f16f1440cc170a564945d84f2129fca0bc951
Pseudo Output
ceedd936b2d4972861a1e5bf166312d3585e928b911d374432aebfb3f84b6451
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c056e83b5ffd5be9ea5d007cf8e9b58de13e10c1789e87b14869c4c14186056
Commitment
a27907d06fd034f035f37df917ff58ec2c270fc39b8765c10885d9122654ca7c
Range Proof
672 bytes (Bulletproof)
Memo
6b40fc22fa3573beaa4ffa76478bba8d2a47b22f8199c54c16d0ab0b0523587f4047d2ca227cbd77626fa8c76d687395b7eb0fcb06d8fd57cc89d4b47978e1b46a2f9478f1873a3f90457586dc7fee6efeb5f48c41003c52d469d87a6e1de221e1c96f1c31a23cf09c263c7d3e5c0b0c5d281c1fd5c33d6539d335f585f97b82 (encrypted)
Stealth Address
36ffd7f1b7f4c7c9cb026f823e83e27707f801c9fab704f16933fa9ccf870411
Commitment
588600fb992bdd729673a94015c8ab22442e61f66013f40833a87c3379ab0228
Range Proof
672 bytes (Bulletproof)
Memo
7a43ffc51e39353bd6b750c4bc3c04f6ae35cc9cddd1bdde84a230607cd164e173f206abe5f8f2b06c20e4d4af685db22040891cc4e3db28876d5c6f81682cd61ac91c6f8d6c81851a0ac7c379a5526319a2fbe44f65eb5169aa2b6119591ad752da94d6e0ee393bb207f3176dd0161303927feb17c297e4f66a4cb242b6db58 (encrypted)
Stealth Address
8053b1ad63e6ee2c793fd42903ea9883ccefc5195fee2eaf0d431e9806050b26
Commitment
1aa5c585285e398e8cc319fbc79df21464b6fa79a1949ddc9fa9060dbeaa6f66
Range Proof
672 bytes (Bulletproof)
Memo
35a886d820094404977b6264f07796635bd73f119ea839b3ef9165db6901b888cc3d5d200879878f8cbea35af9c022791d634c7db6d5218259b1185e7814147d64c1e210a111c9948b169ae51c4c73c55db5af525db1bec0fa6c541df772a7446d1a14f518644fd7937fdfa6333535470d7edd02ceab92e41bf83efafe2c1942 (encrypted)