# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3c2bd928d2ec7e872a9f5a4ad781e4593e34ba10fcbabbb04663c23e2e19be61
Pseudo Output
3ab26c28013e7aa43d05d1bc9b00a17c9a7d5e6615af521de7a0361e71547c42
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
602980c04a474fa7f6e4a9a32a46189e2a7bc4defcb15701acbd68470fa94d54
Commitment
ea37656a3867f76f78e92ebe24b664f627e586049e3829b887167420cd30bd65
Range Proof
672 bytes (Bulletproof)
Memo
ed96b724fda92b63ed2e2c136cf5008510447671ede1eda59c78b62a9f53e4f4bf987ffdc2c1efbf8e43a3641cce79aace546f31ef872e2fdadf99da81ee349f2e8ef311ee26d9ccf7e0bbc15030b562fc7f0b0611c408893d113dd4b029fce0f773c0ec10d05853490479cb35e41eade74eca1ce4b0d73d9f604d46964a8042 (encrypted)
Stealth Address
8c648cd0d1082eeddbe102fde5abeb25225a2d36a9a237270221a39392b84b49
Commitment
a2abddd06a9d1445fa86ee9366c9410ef7f1af1eb4f7658094d6cb22d9f1ca6c
Range Proof
672 bytes (Bulletproof)
Memo
258a617fa9ec87db987bd2f99cd1fe124be4932041103753b0cd9fac3e5b53ffb4fcebe547b901e000b479785d526e57e58264084cab921b3b6eb9d11389ef8d5ce30bcad15c643354dc77052ae08fb1ac5b6af54823265226203e83a28a3bf24af8acadcfd84e0ba9ea0b578fb32955fa474cb04bbcc1ca7c9a2ae8356761a0 (encrypted)
Stealth Address
2a96153b952685c7003c4bbff6ff2f18ea96d5a0be62a93b97720994cda7bb29
Commitment
f4020934bcfcd8e5bae7dc59cc2d8fbc0231d0ad40b2d3b5e916f7846f8ed975
Range Proof
672 bytes (Bulletproof)
Memo
4377bf88ec4320a071dc1b41ab9695261414dca7436c26688de06603b2600d3b4bc3ec9698034297b9dc3667367fb63715ebba6276c4c516070da034af220d4f7ed927ebfaeeab2827020c2ebefdd5687554cb5ca753c39caa18b616a64cb032feab255159981ef94bd4d62c90a8933b7358d282627ed1f0e0aa04443fbb30d6 (encrypted)