# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea65fa22ecd69bde41e2417d51b0dfaff75f6cd5f7f2e66f9ecb6afd9f05cc48
Pseudo Output
ec9ee8e66eacffd4dfba1b97bd41316dd5953984d5d31b32ebd41389496dfb4b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
38917e1a548a04bb37c3a2206ff318a3890fc33f862beda0f8fec4a30077785e
Commitment
dce97631924d7e84cbe426edcbaa9ae688d8b7e3f501082705cf3b31a0afc726
Range Proof
672 bytes (Bulletproof)
Memo
a2d6afd3099fb863a4b94598c20d035bde7fcfb8d2fd46958104bae9cc40003e56af93a80768d78d9e264891901c69d4c8f0b2f18e5060bc8d657558c14f4e6d847cd2642916d5afdaaab2d97298f4573435a188964ec3a590b106363a023a6e2811db09b6a76c2b101664dcb53a47ef3cbb6cd434d3849e94c2e0b66adb016e (encrypted)
Stealth Address
fa02fe119e5afeef4fcb882a24c90e83e2803c89f9efb1cbbe256c81de568e08
Commitment
fe825343930cce73753d653404fe00cca21e3f400e86a8b51e5ab475149cfa5f
Range Proof
672 bytes (Bulletproof)
Memo
8dbaf0581e65a3e8c75bb19412dd82b89ffa14fff8852e65b4c9e8e97b8235f92a3c0f1ae8b5dc692bdb7986ebe63095a3007855fe71ce2d2f5bd3423db2aae69be018a9871124b4aff49a0b59e354bff16c2ed0f33259c65ae12e07193a2ee371bfe4eec972d6559cd837451530f927e6f286a8e9aefa57b6149ccec9f527b1 (encrypted)
Stealth Address
daa775b6bcf6de63111ce3eb28de3922b7068b4d633cdc821d1764c58cb1e67c
Commitment
ea4458acd60523f1a24b7d4544d089693fb16a5a9c647d12b2b55e5b479b1f68
Range Proof
672 bytes (Bulletproof)
Memo
08015ae7c62c245e1c4c317f959714f08a48a42aec56c575bfc10d57aaa528251762c0646f2efdaa7e8b918651e3e0e779dc531f370a17a3b7696286266969008c5eb2ea5b17f0ce0eef1a6d4f123075a68bfb3215f9c9d4ddf573173809af2cee082c8028a5439172744a64fb2eae59b9885afea7332298a2695c7487391687 (encrypted)