# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8bf1d8609d6b64211bc9f4b176c9322fccff224e24bf8bdc6205829e8f1242c
Pseudo Output
da6db0d762369e8c4a5ace675677536de4ac6b8c6d99c76e561a46614be0a21c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c8989457d8fdd77ea2d859252b7a318f43d3519f570febb227ab654fc85f76a
Commitment
802d69ab524a98f934852b6266b7577a10153cda9ca3439220ae65b2cc2e2200
Range Proof
672 bytes (Bulletproof)
Memo
19ec1f08495b3c3b20971681f7e4d251fd9c03c4930e61483fea0120500cddad073ce1d89a0ee3e72405b5bbc1b6ab3c514e51a7c59bd723b68494d078d99e766ad6162c7aa3f8bfb187c55c82734b09ffdeac5caaca243b51f9f7f45fcf779cf74b4e9794d8dcf5dee7c04336cae5c1c833d86234b2b592f319cf38d170c937 (encrypted)
Stealth Address
f457a5e1dc7f1135249ded3c7e889aadd0975ed87d9d4974af1d3957c99f5e13
Commitment
662f0b9b6ebc5a1bba914e725a658dda4e162d2fac8fa8ffe720d88ab6ab2537
Range Proof
672 bytes (Bulletproof)
Memo
95c22c8c80de0be09a415b1e1b321fc792734e90ac1a8923dbedbb700eec5c249634a8a7c63375b64926a113e13e2f54ebb06e028ab7a3ce19e19f305f03c399643372b12c1b734ba12e143ede46ef0f274efbdafa2fc9b0dbe0d95ad8aa609b7ef101a73fd35c94980499b5ea387289fc6cc5f67c717859c246ab389d16c36f (encrypted)
Stealth Address
540bc6d41489b5f1a659d75406d4e7b1824e9c166f54bfb19150f46a88ca6736
Commitment
f4db74273b08e0639e610a7a5b8ef2f6187d106578fd99a0a26370542f88d23f
Range Proof
672 bytes (Bulletproof)
Memo
8988c12e1bc870e226cad960a80ad07b05fdf75a44df246f59bf750abd24b58e04b5f87638a628cdfc2f1d6f2c1edf0c5b4bec2a0b6c77b496f9b85b99f898379ffcdbbbc5e174e2f9e9c824b453050a40390f301cefe89c5d8095a52cec7402d3b44d1c128a36aae4ec1b5b12587009060f50b0edc10f43f7e70e7f39c4ce20 (encrypted)