# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9037d71a9a5923ee4823a203f4af15acfa3d041b3fdbbbe6001dbb4c23655566
Pseudo Output
dc699f9d4e3fb27a9786f5b862d415b27a379a5f73cfa028fcff0727cd9c2527
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
38cbb20e89eb4e192e176dd61e069e03bddd8142e19224516effeaf9f43bcd4c
Commitment
4cd66f4f62e4832bfac72477e6b808fe531dab60524877604b192f5811764a77
Range Proof
672 bytes (Bulletproof)
Memo
e4084fbc61f736792a1f465b52e9edc7cbf0bd86dd548b776d76bd5ee45946fc95fdf834b10b0cdc30c0dbca96e1623ca23e178414d6e4a69d6d7fa57f809d8451e85ad8c6f93f21dcb7a600456665e700369f3f9333bb4e1dd6d0b444d5638c491ca8d4ca8f90b3582312945d7d571b6abb9fda5adc01372259d2bc88b1fe9f (encrypted)
Stealth Address
906f08546cdef3b56fc5a671e2ba8c20183746e2b4926ac99aae9e5214923c4c
Commitment
fa329f81be2ec1c06497847ad8e73b400007171e9a35309a812ef0bb42b4bf52
Range Proof
672 bytes (Bulletproof)
Memo
4ffc2b5eace5dcac4e44e361d23a41f8f09248544084f557001f24b3c11a4a565f48436cd12aa162d1799f8a29d53ed77c8333d93b92f0a6162bb09a15cb11823ea38025d0e65f2b7de6e48a87670df6c18b2765dcdb25be503ccbbc0247ef76d17c8d3076d80f8fbb1f7290c1f86d494ee3542abbe66790e160d4d0318ce3e7 (encrypted)
Stealth Address
7a9be77329e2783369cd4425bf647dade5894b525fcb7b9c49e0e7f97df16f7f
Commitment
aca72212284869063e155b8d59d9d7eaf97ab3480e9ff15e6d04ebece1868022
Range Proof
672 bytes (Bulletproof)
Memo
6dc68fb82202044555b3f5fdfc0aad4cb2e8368f9ccdfe2bd1fcfd2a7d9b7227a47736a3dfd3a1a5cd5140115e433aa75f30a6a81b792bf8888a12052f1d94fa38027fb2718207bd2226daf468a8cd3128a908588b20788d7b04c795b776700087bb72267ae109b58719059345017dab33de42c94206a0876432411fe3b535e4 (encrypted)