# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c83a2e9ce1276192c4e7bbb72b4f3ddac1fec85aaddde6f37e4bb4ae4fc70a22
Pseudo Output
fcbe6b0ae2d95c12bc62a8fb775f0ff1ee7fafe8a01cd613c733760e0ccc0938
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3892e7bba6237353aea7e69461d2b988488b6017b977924712367d8cf11fa176
Commitment
742e8e4b50e1104e3b90ee48564c88cdc0fa51805112e4a4e1c4a9afe836202e
Range Proof
672 bytes (Bulletproof)
Memo
8363ecfe2a669125833f9aa8e1c0fc6ea8a3b09e681097ae2cfbb006d7dc10e2602ad10a3f12a847701b20efb5aa8f1c7603086ba15119da1b97472996d3b7accb213a884528c784bdd0634be82d1eca4101b337d3eaa54eb498223640ca738c2558b1b95a8cc19841968d9c41cc50d7bcd6fcd35f7abb24ff650e91b8e68e1b (encrypted)
Stealth Address
1275adabc389803e8106120177d0e30e410d9ae9818d86fb06c79ff31f07c91b
Commitment
028858629b5a0ae8d68a7cd758cefdddff1ad4ba41301054e50bd0bb0728cd72
Range Proof
672 bytes (Bulletproof)
Memo
7aa4240a070987cf5d2ebbe2e29124d6c8de474af30efee2d3d81501070e47cc1a1b52805575a90a9288fad3aab8ae4c86ee272797a1914150f30f739487852906f20557dfeaac384f5d91c18ca057fd306dfd8bb84a615a69b4db9e85517edd46c766383ef9895c048611e26c363143e06aab87b8dd44a3cc13b5a432b155b0 (encrypted)
Stealth Address
0ab6cf3efdb91abd47ae80a263d7a2f007e5e4fb6aa5098e1d0a6f80a8559f03
Commitment
4087b06a951f962cc09ff6fe2ceec611f8329ad541aa5f820b97cce6f7e91503
Range Proof
672 bytes (Bulletproof)
Memo
75d5b962310bac0e3c51cf0050722bdbaa7c1bacebf93bd9f9b9e3b97409c3d77ab354e32eaf08f8d8397c34b876f08fda9a8a6571085602d8b0b6df51c4c001f34646b94abfbea454ad503f2ba881fffc6f1f322921f8f388ee31935a97dca71ca28bdaa315f48135b3d0c50ba426b37b0eec72f7d15046af4b8b391afadbae (encrypted)