# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
34485ec70db7749a7f17ad2cb3f42b8a104cf816833c67100eac4300c487120e
Pseudo Output
f07b336952993526917fec2799dfbd955d7793028b6c4aae2bdc97616847897b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3cfc505407d2a5505b49692658d8f632e1669e5495c78fd01abcb182ab976d15
Commitment
445a9dba2b8fcc93f08ac3046150d3c4d554c5a9abde92c661ab82a94afd141d
Range Proof
672 bytes (Bulletproof)
Memo
419e360191136d8a3ce662a7a31cabaf8d894dfb8d416cc12fd601632a18551715b9614f7a32d237d4e83981a0fbd12435efd9f73259b97c1aa63fd5db7afb1fb0adee2c030695f803ad2d7e503a554b770155de56629be79442328ce04fac6aa98e2293241d1fc9840e83af1c64f54d5d95021b7eb33c2fcc18c05f3cc10361 (encrypted)
Stealth Address
644322daf453ed4db1e2af9c8f0f1a90bf830a98152a8d8e1a2f564ada77a92d
Commitment
f29d344b9730cd242bdf81584825e06b926a1977c04fca0330a16d44bf702901
Range Proof
672 bytes (Bulletproof)
Memo
76e577fb5abb85928a475d70efe0c4d656046417f3f613c93bb2e61c1fd5250e1a7109d71e39452f59e34918587c528e66c4898cbe67153b19c23e7cee43719be7dff9ed820162ddb136d394efc6855a5016cea802006506b45c6dece5b0893ca27fa1efc2678e6f86f7c065caed3908157264ec9ddb0b21debb9bf438840abc (encrypted)
Stealth Address
b6edfa9bf1d043acf611e02cd9ca7012ef2e8eced6ece64d0a6dc33e54444454
Commitment
744ce9e270aab061709aaeca844ebf2e9778d0a21e6b1f367681e1e01da0a85d
Range Proof
672 bytes (Bulletproof)
Memo
695da23a62fd232b14b854e7678546a4cd1de5ef2e2221767352fc3e83031c33372b966695734bd04c3334fb52e807173b65dd6c49ce62f365870ef55c8219c7b47d749c5e18aefdba2b71a86050ff2cbbdb755bb283abfaf0c444e833cb0bbc7e1110e894697a593f678ad33b00e72bf8ed00a0e754b89a81e551e3326a0a7d (encrypted)