# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
942d4e47be0f801c7e99cc32088cc71389993846618a5d14786483b4cd72ff38
Pseudo Output
6256f75f2cc08a5d1a959d7f65b9886876de0bccf4e3b18b9c649fadd3d69b2e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c2e1ca9764c9701d769e444a6c65e480ce7225994cb45d5795e917e2797c719
Commitment
de4f35519738368898449a8554a99b197890f61cf34014f2a2fba762882f747e
Range Proof
672 bytes (Bulletproof)
Memo
a622ddd977bf6c5f548e6b4d49c61f056a582b8caca29acbef4c1ef475d9cc78c661147eabff4b137f20a6370281a44df7b5019387ca8973aefb23c0a429815c03f1fb2b1650796cb56f2d61578b03292ef412101eebc1dca019472fde89bd7e9208587205cd93b3984ceb3e854f0f6df10f8b609986f96634dc88afd25fc118 (encrypted)
Stealth Address
beddbc8727d639514938fd8993b4c78143f6bcb835dd5e5946b09288b1ba6b27
Commitment
b69d14d125fd62ab22a033674ca5b8158be287c43c8c63d7744f4b4ae71add08
Range Proof
672 bytes (Bulletproof)
Memo
4d5ab796e57a6f0097b02f5e47b6f5786b9e9241fda9688e2430de2aab5ed7427861eee05989974eab67a4ff9491a2699d5ba389e4b2862d15aa7ff4efa88168c4ea40cd8da7e49d5bc7c25568e0009f374adf8a0ab32487ed7a8fb8684ebfd27570bb944a67d53a5cac01930136f3a9493d6da56c66c96ee191b6f16febcf4e (encrypted)
Stealth Address
b6358ca37dedeb6655744b54729afff74664c50227e2124b78e589c5b7f98b66
Commitment
940f3d032631a8ef3f2ed664ee7065c2a35dd3b7e0e51762abda958e96bea809
Range Proof
672 bytes (Bulletproof)
Memo
bfad1dfbc4f72eabe469d7c57f37bde68f5548aac5dd008c69b729bd80adb411ae618d616ee0243df57076319ce7688b48d338e45aa7405020245bc812d9d21a77f9e1ee047691aba6b9effbd87471ef34bd19dc13c0c9e9482c7430a56ff64336b66674667025297a8c37310c13d55782c9c7dccdd98affb3ff9b2aef0fcfea (encrypted)