# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72165be398fba18b3a09c604361f35ec4e598d32589c3fd58f168833d5974256
Pseudo Output
fca0beae740998f4e928c9083f72d4a5d581333cc6f48338897e8e0c0af53d43
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3ac2ed6f76c6c61cb73cca47c1d6d46537a68a7a4b680f65a4705e707e225a54
Commitment
8022b5bbd603071dea6f5c99764ecdcff160d567cca5ffbc738a54b008b39d06
Range Proof
672 bytes (Bulletproof)
Memo
f2c16bbe3f91d7f86866a33d674fc9036b33faece157e1a198e1146cd3bed40d8243c21ec7683be2a2c958de2efbcad6a3f8771eab1682597e79617dd4e887ac8cb39fe8c246e133c641390e10931a0cdbe15764412572c63c45b73445080fc86f11f26994ca752f383b11eb22ccb622d5769c2acd191cbd5fecd2ed2269af3f (encrypted)
Stealth Address
7e1bf3b24eeb4a971330baff0d82e6789092533ff4c88f9ea02d858d55540937
Commitment
3effa2c59041fc9fc2e09805a208e39fc39278915636f182f052299c0086535b
Range Proof
672 bytes (Bulletproof)
Memo
3c39afe57849aa19a8bc613289198f79a11898f71e2c60c6ea2e412602f70df94e9cd4598a09dda7e81256722909d913f3bf924c5ecf432228d893f807fa2a0cfa9f547d123d1e97500204269c52ef300383702eee86ec838e5d3eae8e6cf63bde2ee95e83729843ef9baa34aa7ae43421096a9c77f88e49624a54b912d41542 (encrypted)
Stealth Address
e8acb5fcc80e1b8b31348364dc738d81e6364f88216a1e719436e48b7f8aae43
Commitment
da8f3ffffe0399d67838ff5f00d059536f4d4cec25a5696d9d3f90225c4db121
Range Proof
672 bytes (Bulletproof)
Memo
845d1561ad3c6e923b5b40c8e00416531d01cf580d2c8e06666fc72e3acc184af2fc8b06ab6096ebe21fe879315e6b75af3eeb1afde6cf518bc5d8c0d342244d683978a2f4c3dc600af91d2e3a6c3eeb1432c7bca3b2c272bb2eb80888724a73d78f0daf5264967e98a9972545457f4782d51ac29fc73c2099afd59d86bd858b (encrypted)