# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fad7376e3d183f6f9a80a87846131a368ca5081ced931a5168f3463682097068
Pseudo Output
02a2e9e7046f3e99a7debdcdaa009e1b8628928e315855e2a613147bf9ef3e40
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a33e29b90afa3f233eb9333bf2ec6ff3d60f9ca6b6e1bed91d25b9c608ca575
Commitment
9a576c5820ab43c2f1a5d24638cf3a88f2b523dcb7911bde1b54001806c8462e
Range Proof
672 bytes (Bulletproof)
Memo
4842c291dc447ae99bb60dfe76f9e22cc19eac9f5d99f0e3a6ba5b9b243c9dce8bd41e48c03a8081cb24e38a22c3810d412e1498ff4ce82ae9f76a419bcd87406a42d0ccf2c6900a751a240717cb07e60d4d2043da0e82f3f867d73ac3a7056523f1773b83ed375b112ec93ab843dfe28167f3ea81d1da9c591b12a1c90839bd (encrypted)
Stealth Address
caf3d226f23ccfa07b8249ae5238030ed4cec8bd94fb0f4892abfded7f457974
Commitment
1e747e78e1e6dc17ff0793bc2ab419cd25ba949093ed5c7a0ba509e88890ba76
Range Proof
672 bytes (Bulletproof)
Memo
f1d1a33a240fa1563d6c1cb57f482787ba282e4e335a79a9a55a5e8fc82b3af4a9376433f4fbfe70dd9c965e61ac76687f25d92970ea7be99b22777b645aab1ec19d520ccb4d93b3f19e887cb4f79763154e86d9c44f07a7723d2bfe2b40aeca497f1122633ed9a484a98485904208c5c096cc832e3f2381f948ba309a5b693c (encrypted)
Stealth Address
68f5198e9118b0d20da1c4b68cae1875107ff2fad7a3e21ae9c1a30ade54c030
Commitment
821d05976c15945bc11b50ba767fd792a7fc4b2e8af0f1de1c7d9521fd441263
Range Proof
672 bytes (Bulletproof)
Memo
e6adeb99dd3816bd7c1787e56ad897b9c9af290f00102a56008432bc608463c4f125657fbc5ab0ebeebdd39035d1d17a17e9132f143c62ece8e6329ead52e6519cd08b45746cac3a15cad8dd478afda3b5840269083182690d8e112de8faca4dfef123e2a4ccd04976a59553631fc052bb6bab4a05efce73ba9489793fb80fec (encrypted)