# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
729cff8c8a6490024b2538b7b4e34d709e02a1e158ad9369dc218230cb410a3a
Pseudo Output
1e0b32fc3baf9e09f368d1973b9cb7fc4d82423abc0eebb292caa5d8126fe667
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3cc128ef36dab1c4ce72762612eb79f67243920d2124c70f6441aee5ada84177
Commitment
f818661e61531b85054eeb450172301803ff1ceb9d22bce79b2080597461240b
Range Proof
672 bytes (Bulletproof)
Memo
0879455dd0413e00ee05d898ea52e7e6c7f41280c9f04d64cc070fc195b77d5a025007967de353772002e6d272f05e7a565a505451b8416c5a76f81f315a51455586ce13c1071cf817e0165ef81878eaa7d98ad6b85f7a2cf7d61faa68ce38cd5895d20052d2c4cb80c970c13b624a577a8b7b6f908c4649ac23ad70b1738d7b (encrypted)
Stealth Address
0066a749775513fd9d8400dc4f0dee931d2ffbe3141fff28513c512875ece954
Commitment
62cd80e90c22ce1049cfdd6add092021c0dcc273439e03fd386fc23bd0b78d0e
Range Proof
672 bytes (Bulletproof)
Memo
7caa6384316381e3176c7cf1a0bdb188dd4323ef1631513223b4dc39a64cc8468fa6e01caf62fa1eb15a4525148da48214d12a85886249f5d5d71f542398539fede5c6e7295d3afc83297fdfdeafd8630d755c7e040db26fe9de5d81a790df12787288be5b23d2ef6397ac037ff40c9009b0e5b6fa4e1c77c76f39b52ddc5dfe (encrypted)
Stealth Address
d0f7b6aadc527a8620861275c0b1a2666949505e4cfa3428cd50955768dcf81b
Commitment
f66d542edb4bb9c146f085c9013e989847debe4e0632ebac6d3b8307c283bb39
Range Proof
672 bytes (Bulletproof)
Memo
e45f473d86f6291f535ea7938f5207ad14c41f5fc6d640ad79a4f6b966b63e6a4e9f77f6d5e8b55e324f4d8d9052b6a90185fb293630354e2d6a30fa8a2b8fe7415492d4e9457ee5e01d120ea37aef4718cb3b198ab7251d1fe98214aca6316fdcb0d154a599befb493ffd42450ecc65524369f5173a73796ea3b9938ff76079 (encrypted)