# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
467cc1202496eb3a5ca59ccdccecac4471b4acbf25b18f4571e5fbd43c3f9e20
Pseudo Output
fa563ff73be3b2d9d6e5dedd31421213aa23a4e0c90a28a7c7ca96c83731ec6a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
343b8c7d3bf287a116292a6d3afca531ee08c909750f8f8eb84431fe9c35466c
Commitment
3e6807d2c46eb7586555ad7e42c45d294dfa6cb94ebb85b4b77d51efa2c2536e
Range Proof
672 bytes (Bulletproof)
Memo
4a58be1a98dbb10a3d062fc11cd84b20fdfd4daca96a28c81882e8df3f2fc927ff0aab5300c4a57d9a5af709a0ca9d7ee263fa95fa6bc447f2d30abe0bc62bb07100cf1f2b5d56142540ce4effd6d43b172e946f7ba0946968eb9975e88463453df06817634687f340b3929e5c8f3f9adecccca6891b48014517ed71af45bcfd (encrypted)
Stealth Address
3660cd68880ac0408d18b27ee8d693341294f366f92b082182d51deb1f09e44f
Commitment
307819ed1d096aaa6e2e9548a378ee7b7989b2eb657a306a1901ae256c1f8d01
Range Proof
672 bytes (Bulletproof)
Memo
a4d387f425254c28633bdca412fb564ebf1ba97abd10b52e53b340a261b8e79a4bc49a794d63ff30855fe3a7322e88445ed6a2eea2330b36ee1251de240d97754888c4e94488135793ece5459fbb2b5fdd157c8bf5dfc4eae1b5e6ba28a05aef04cb4ce889c69f3129720930ece31c6f3ae4fec8dbeac6c2dfe85c852966d311 (encrypted)
Stealth Address
16d11cf6cf2305de7afda748d9f1e07852afc04687a13be6d8e6ee4eef693620
Commitment
069b3ef623d2b2acc90e1364d567d32beed2e7611303794747a37eae0e7b3f01
Range Proof
672 bytes (Bulletproof)
Memo
f2c55ebb502d3a778b10f2c285d98a4521d7756d6c4ce658e3878dff4d98f08bbd3d2507ff8edcab8e40e40a40f377b83fce191552dc8a051cf6d0e5fc879503c421acacd09dc63be42b9f40ed24630ccb1642fc372e37e05ce92f2e8a3db94673a22f9d4ed24a32e9f4b7ca83c098227cb75d23ddc48b4eb515b1a1a457583e (encrypted)