# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
422a033ea722dcd94b28fdf8d6b45da07467f317601003a24228daa7caa1aa56
Pseudo Output
f6deddd908efb4dfb9676966d864608165daa35ed7e7c659cfb6dae33ffa5e3f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
36ddaa26432accc08399de5b72f2c9674c7ae2b7e74debe2d488d4f1bfa6c349
Commitment
44fbca04977d6fa467e8a9900981518e1df885f1412293b2e38a0e0335cd0f2c
Range Proof
672 bytes (Bulletproof)
Memo
3bc13b1310ac9b568ca5149cb2db44c69346fb87fae977e94df4d353b8868e4f7720526f7542be38dde386666fd90e34c9d16b3d177b82acdefe1ab462b6e2b2f3f9b91b8e6fcdf9d29aae6835a14ccc27fc314cb86f05e0b4e8f31908eb9d5e620c78e1f7a898dbb183854f774ba021486a665b4daf82f82cd77a601c2694e3 (encrypted)
Stealth Address
dc31002de4dac52e6be3373db09274f00087e9078a17c6b3c1801d35ba7e176c
Commitment
eaf8b973a178bc488bb681b3b88436647aa876f1949228eaf252863b550c3a3a
Range Proof
672 bytes (Bulletproof)
Memo
f7387f6ec40a795573da3ac2df5a7b51e1b4c96dea6e089f9739c89ba9202e692db09a05be034f3962db8201d3eae8706abb15f88fccdb065aa2c22d5c5b0bd55dfdbdece55bad7e9437122d7dcd02b6c26192e4ab9d8cb61397ad5eab6fa5a1006cd6c6997bd12b2e870452b0e00a3322b57bd08067f7c439998478c70821f8 (encrypted)
Stealth Address
a2dab6497b0df66f5787255c3f7775b8ccdf6dfa53ab9e5d505ad2349d0df143
Commitment
a4d8b4c90fd3a16c74b50514a7d94ce4592f093cf12b20d2861fea2d78a1584d
Range Proof
672 bytes (Bulletproof)
Memo
6e31893ce78c946e88d250f908d95e0faf6ba65ce6e324256bb8e2393a6ee78fd053cb8e01a2e9eaf95e75336a049cad4ad671e87bfdb7c0029fc78a6e81ff16d3c304207db20e8d9195241928e5ad53e8f21fa96d69e8730a7d9e836d92a3c46f7490837269f0bb95728fc949ba7f4ff9c2d2f8890c421485aa49ec1a004c85 (encrypted)