# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2a34ec4d0edc37bd8c6b35fe35d6f0f81e873827cd826f81ae0eb2481f4ce2a
Pseudo Output
9a20c46e557458d16450a0cc75c0e29558d9675b4e08b7c4b6d86619e8fd5576
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a326fd100cd0b5aefbe324c6acb6dd50034c193b8ea0d09a4cb68fbdd538261
Commitment
c81d69468e86d85b1e233a96e4dfeb3557b5c3eb1c9496279ced0ff90f2f921d
Range Proof
672 bytes (Bulletproof)
Memo
1d568e77351e8df70194615649de48c4c95753be505b5f304f2b8662417bc1a1cbb970deacdf6f32866453935d41860103f16e589fb5a7e5bbe99c2b8504e5e93cfd1edc4a763ba0dd55b8b913e9d81d62a84789702129f2eb9efc200cd78e3580ae55abdfba90eead6014f032dea3f0f89a1d8440c713bc51e92cc9aee9626a (encrypted)
Stealth Address
5af3b75f43421abeaf8995f73a0f152b94034befd32c5bf99ba8a78f495f355e
Commitment
cc068440cd440c903d2197e257ed09e44fcde263ddaf5a6662348ea259c1cc14
Range Proof
672 bytes (Bulletproof)
Memo
c34e040b3c618740feb48d614c0958607f929dbe6b423c2bf07286a0efd96a06f663064f492ccc5fa0ced8f7cb874ee415d01253d5fd8328bfc5838f7797207c649d11d2984490f5b3fe0ba6636c503ebe43104c220910911555ab9040330c6af8e49cecb7f2dbd2c13012aae26699a141bf1607a8f78ed805ac605807aabafc (encrypted)
Stealth Address
28ea873068c5c81942a9c973f257cd940ef1e96ca36a414218765369758df430
Commitment
c2a4a7c1c81bfb0644908a5d1abeb11ab4bab3280c7dd60f3e5623def4ca991c
Range Proof
672 bytes (Bulletproof)
Memo
a560755aeeac4f7e0a6d06adf676bb327c634c0f8410ed716a0c0abfbf1ebcf15ff005bb6a08f016328160ef6878f296e1d880dab4c07afc8604c4c3dab952cb954a34d1fafd3fa932c7c65dbdb0e25e9bab3be5a457a595469d79daf58fe674134baad1f8c2b363e857680a547af72dbbe39039fc0f71c0ce4a333c3522308c (encrypted)