# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a494ac816c17cb292c64a899d4dc4f84451e0e6600b94edc5584513eaf2d53e
Pseudo Output
f0f53169622f39299ee1202b0b4b13f276a3d4f5f7ddf398e4d81c019595ba17
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
803b13961f01bed58f55dbf084596abc63fa11c20fb7da2eedf65fd6b7b5f116
Commitment
608e90fbc7c2243c4266d9440079b61919275d54a3fdef782ee8695f11bc4e75
Range Proof
672 bytes (Bulletproof)
Memo
a01f22a194c0f3dc5137d8d131fd47ef2b6412bb6f8bea028f65c82a50a86fad71523bffec408b1c0e9f2bc35c735cd5b23b81a13e1ec469c9312dc6f8b3f164911633e1fe74922c69a96936354841df31769e8782c62024a55664a39ceabcb4c84abe39afea81c9b731e091a9fe2bd9cc74600a2ff10aaaa5af9e3f87e82895 (encrypted)
Stealth Address
fe00758793a2ea0cb11d9dd36fba4d21adc59a3926e7971f54f561d972bdf920
Commitment
4c01e7c98b2414451b9595fbd4dc8b713c321248d275c282f0df3f077a0ac167
Range Proof
672 bytes (Bulletproof)
Memo
416a7a41284d5ebaee82b264589154b30801fd9c6268c461d8f86e8c5e5bb5923ec8322af1eb01d8779a88a0ee61e6be0798569c1945eb2da77329eaf257840693bd0200a55102b3200c818d4abc984774216a0ea48a681c2978a6414d3b02331605c411b3c12e3bfd08b0606651954a7459101bd86f16fe12947d37724affc0 (encrypted)
Stealth Address
bc78b6c8803ee853d627e43e0375bc06f9694d5946a084381f0a22906654610d
Commitment
48ce7a3ecb1bfb589a36a4c4fec07562266ce318950f41a83a2788209ebbf53e
Range Proof
672 bytes (Bulletproof)
Memo
af97e6ac15703a8f73304089b60f268435e94fab02644d3765f115285bf44aa4ca6a48d4a44648045d1f3b0e0377f2b76528c7a39caa8f9526dd4ae3ca1b30110e889b7c86c67c66b83ee148b8868992832881d380bf8c613da96e15042aaa2f3a013db90c1ce031ef97a02fe2587da4202a7838b514513fc422c55aa737043e (encrypted)