# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90bc62098a7c45ef50ff16c9e47283d9b30c40942b49ea4718eeca6fcdd6cb2b
Pseudo Output
d2f30e5dfec90076b8abdf302f3c3d2d1c45b0a3819abfcaef5e012cad54d92a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3cb7ab3a20c7df219013d3d5a4cb359cb8f1b51dc0e3999f2375fc497a3f746e
Commitment
826eac15cc9cf56945da49b8aa0b647c972bf20d139e2023a71bdd1080bff504
Range Proof
672 bytes (Bulletproof)
Memo
353902c61ace69c332601313caae88da890858b7860d69596b5279c8db3456ffdbfb1ab74d876c875a6282814b960310882f39d69f2f7de4549fb66d562ce38b092d1686ead9aac1319a514e4f47e84c40734fa9e2e7ab7b322867158fcf2703cb7cfabb96dbf0a7fc39a04eb92636168ba9bd7e5e5fa78918d1170d33d399ce (encrypted)
Stealth Address
38d7eb91e0247c03540cb48c4e1165bf2092fb2247bdc516f31b33cf78776d01
Commitment
ca1294e9d7529d117c60e6784a7ccd9474ea14b6a4ea4f31af5f2ad61f897073
Range Proof
672 bytes (Bulletproof)
Memo
5e59a34af5e7c7967e76fc39e0f3840a268b90e1867fa25c1198c5f798a283967eefafb6f7798746ce6bf15f7399444813c2b90785893ceefd051707a8f9fe374f597816fe9be8431fa41bb39553c45ab43da40e7711e631eac1932758e4a6141b2472c82398ad077065a23f28cc1a3368d753b3b70c0598d30849c3b8fd0b3e (encrypted)
Stealth Address
3acd4d64ba4ebc79cac7385bca4f2fa75a1da889452c3bffe42e8912a313996c
Commitment
0a325563eded19180b9aab3967b8c512305a62938bf51c0f3f8823137dd1a76e
Range Proof
672 bytes (Bulletproof)
Memo
f9e606d611c5e5694ef375087c20f7fa99ad0dfc173ee2b395e5b905ed1688e7dcbe39b3ae564baca8bf2546cd707e78d4798e64ab3baa89ac412b553a52343a2fba917e30ad6888e13cda98e8e86a29b18cb82d1008fe7895c9240d8e2ea7ce8a9449c42359c9ead64b3e80a2b87bb3bb280ba4665134057f4bf3885d855839 (encrypted)