# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
149e1363aff46a4c517cc36bdfffa75a03aecd668f04a474f01479645102f01f
Pseudo Output
f248dff10bcd8aa7fa80ee09485d4307f4421eea3f57afba4e7c0ba4ee793c79
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a190cb2964f4ba8ed7f2f342ccf4df4e3848f822b99465dc9b8475af71c9e11
Commitment
e035e953683bf93ca3900413635c03fd6c7b5624c0f2536a518a81618975342a
Range Proof
672 bytes (Bulletproof)
Memo
60227d304b3e8c3d1c782adbdf5c9798e6ac3cafef8db9e91f39ffcd51d8e86d58b2b5f669610de5a2bdc0ad6180effdad2fdfd32018723920568897b35a4866e9076dc9ee7f4e645afe6d675bfee8ed85543724aafbf8a783989800a7217d97868e6825d2a0a0ac31a1203e1bc538248c4cd12cd511fd639c2aca2034823ae0 (encrypted)
Stealth Address
8a71521e64d9029d4ea8d92d83c8e710825882cfc68be9e2b9e503c04c865f17
Commitment
345c881ae26301997d0b59b39c0f4adc246c455b2cd649e440460221fb244c51
Range Proof
672 bytes (Bulletproof)
Memo
dc047c18c5d80f06dcaaa8c347165144be9ac597a42930f81c24593870fae1c9a491105bde8a3de5477c83e82569c179548a10de0137d33cbda284506c2bca1752f88ed1517713700e69efbe98264d147cb8436963c739021a1dca39e31b23ff2d59aa968de8287eb97b740cfe602fb9edecaf235dc56149e923ab1fbd3f873c (encrypted)
Stealth Address
9a15cb1394a1afc10a47f2deaaa3f1ca2e9ad0488756546a742511a7dcd0d947
Commitment
3239fa88f174f342178cda5883210ce3a886d5a66e6787ed963f064e54cf6d00
Range Proof
672 bytes (Bulletproof)
Memo
ac4c4a4a62d7e5aacd7c6f0d199b5db8052b00c6116c9a6270039f6aea746386d38a9056fe5b866d31efff37229f72986da91182bf6fb886c442939e2c8f36a1e5f6762f3e0272bde459d25949fa126a27fb1f39e6ab81604b7d0dc8db7783ab0cc24385c36c6d10428819bf727124cee1700e6aac24058ea040e1536cb6352f (encrypted)