# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a45ba3a3e28e51b5ec5bdbb39e737cdb95dee023ff029d0c94fd7f32aa379223
Pseudo Output
ec322e37100d4ed9b05a3fbd3fdb8ca23c4a683b1f47ab80bb5263a46899ea75
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
082942465c6a8e3b048f1e0537e9519c1bcad4ab8495125ca09ed9cbc4ca147f
Commitment
3cdbfb688ed6277895cbaa58a3f7f036d49ee1d9a9ed4193040415c4acf48422
Range Proof
672 bytes (Bulletproof)
Memo
a72145415363d92e9dc2b9e21cef8481c04d533ab1a6d461231b3263326906857287c2409e0141e146718eee2d5be164f1373d70eb1bc3a635fb715abcd4dbda857d6cf25eeb39ed381346cb605a60653cfabd0ae490ff7b1e744b43fd4dcf9e5bc0ff3aa1851daccc7b6d432e93c7e1eba8ce71fe54f9e18b219e3b122d791b (encrypted)
Stealth Address
32463930f53929951ed1dc1ea2537cf7855cc820a7e5d92ac9a715a83732ba00
Commitment
b8b6306c16a537ae3d2106b68effe09dc93ee9828de92fc30978c0cf5fde9031
Range Proof
672 bytes (Bulletproof)
Memo
15fc8faa279cc01d555f8282c5be54e6a090fb0800cb2ee00b1e9d96c58249d11e3da673aad5a534fe08cfb7f4d934f70523081cd7755cd188ee534f8a6d2141ddbb9ddf4589372d0f8cf14ab7c226e146aa24f38b9c602afdc72ef5d986620b2d3563d00ba92c2df7dac718b8209b005555174df009e613c9baa126b674deaf (encrypted)
Stealth Address
5c5808b699c50c6ae87a488716016f1290ae5b67598e5431dccac9324b78bc59
Commitment
1213a3bfff450cd413a11fa13ff78e3ce4a7d64a4178bbf1d485959f20846d33
Range Proof
672 bytes (Bulletproof)
Memo
596f8a39f5da82092ad0c7222c9918c8e8b3fde2372ce4fe30f58c455120425620f5861b1492abb1e05a47e563fde31c3f9c341d3c1b9de364e175a5d913bc883def8f4c597de341d1083d3c80aceeb1a776914cda7b2c8e7b9f873c96476a7d7f3ddf2531562f83968dcbd11670c84e6f6a20ede9aadca1af1c9dc03f3b4d71 (encrypted)