# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea22736449afdbc30fbb6511662be07e4aba15063f3a75bfb2d825e03e7ad55c
Pseudo Output
36fdd61ad4a0026db520f8d72421d68ea1c31036db9fdb2236400f52b4b4682b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c9461953aef536e95c6be9af8ef5b249e789a75bf09e723b798f6ba81ee062d
Commitment
44b9f7f2dd1fcd2572aae4dedfcfb79bbbcdd7a983a07e54d698004094e04b2f
Range Proof
672 bytes (Bulletproof)
Memo
616a2f30174f52aa9deb7f4cd0db5cca88d6f0aa2043cb1bde5796f0b64361ae03ede3e917da6a50fbdd2a2bacc1553571226c304acfdee48798a07d40d6e5bfb6f881f1811fb9789ce6c5cf94fe1d1a8650b331a79631b849fd9060534da3ded4ca647946234bff3d5a806ced246cdd62a1cd4cc17a27a2e47bb6c47d6bd3eb (encrypted)
Stealth Address
ba155ca8c1d207faee9399ca1af1c4085e36709c46bf2cdabaa1a720c37eae6b
Commitment
f2831e579e8ea3c918cab4f63336101d7f9caf255cf6eb2466bcfbc6a6d27140
Range Proof
672 bytes (Bulletproof)
Memo
9423fe690c2dae698a6a788b3798f2002f36c8baba993eed51dc718630095b9d4b537c8495c098097cff6460036049315b2b158b461c9b43d53dbeea54176170c69d60059ac403324c3e93c78f38d9ecfb93dfa58fd8c922262d32897957f343f0722f53bee0d50ff068835f9f5d748e2193500cde995879ea13348b0cef600a (encrypted)
Stealth Address
fcbbb9985352fdc5476b5bb3a63493cd73e0ca74a0c0a314ef8c38d5f7fa7b50
Commitment
34a09edcaa132c46226a1bf5d5648fbbfcf0e3331dd6d67f2db3379072ad232e
Range Proof
672 bytes (Bulletproof)
Memo
2a715c3cdb07bd7084428cc7d261249dc3617ffe4c5e8464c62c19e395812b1053eb598bc709a0c9f0c9433f42366f003e7cb70ad38bfe073cd2e40091cee33f3a1aa28c945657802432339bad96d96cd98036431e761c9418768e108ccf04d1622e20b8544b554e36985040bf2bc05e9e9f0ca44dd491e97d18edf92e08d2a3 (encrypted)