# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b8b1607887cdcb34c7aaf39d1b0fd2e1ed8269cc2176510e442d7025d75af97f
Pseudo Output
c46f1bac1c93baadd1152c7b567a45b10b3b89c64a5ebc21bc6e7efffa8bcf09
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3ace29a2ad3c678f0ecc10feb23e4b8ddb73f9514c1cfcca318a8e58cecb2d63
Commitment
70cd4ebbb9091faecd9bafa1fb1927462801b9f35e7911c3a85d3386b6bc936d
Range Proof
672 bytes (Bulletproof)
Memo
674dd1c042fa405bc2777bb111764f6875865b630b0d21ba757af88bc320d2cbb51b01ac47a434acb9af93cb5edf0cb3210a37bdcf0a9c7f7c3f2297f39e5ccddd953de5e347f409a3dbe58746d2ea3ae0e213a9ba9be09f3c2ad0ce03dcac3e489532e6f278fdd4d1e0e2d6b0e778ce02f3d25f9b8605a348d107cbcdaa6327 (encrypted)
Stealth Address
f01ecf85c773c014e16d3669c603ab2c46d71cd3127172ea0c37901e7d6d486d
Commitment
881a12c3811b1bf1775f19a257c32c2d3d20d4fe89b80bd45dc81683e024ee7e
Range Proof
672 bytes (Bulletproof)
Memo
ad75ba2a9182498d736fa620c68ffc6a4debecbbe932ce77d449df6c49c69bf5fac42c9b4a38743f274ff5457cd92acfacb2e7e4e6d4b52bfae9da32e7e9b51ffbce7a9c1ed9677cdea985280e32903a7456bcb735f14d2f1319e10c9d79a7eff946f13a9ad75421b5ba3604e1d7d94e4c0e5f1ea9d41c717f883215b4016c6c (encrypted)
Stealth Address
865fc572b7be597f1f21406e2d1912aa47aac8a7367d7942e9eca1608315fb1c
Commitment
1cb0386fbfee56b81e67cd3067e3bb0c0c7c51af642bc1af8debb470090b1068
Range Proof
672 bytes (Bulletproof)
Memo
e810307d0110cf98e3f79d00f0aa438e6503ae57374bd36ddfb89f4f6ecc9916ff8e2fc78f8ad1e076f4f7e26c365a4a5d32addd4edd6257086e1e1f87c144e92039f33d2f4d8c564a06255dd3dcbb9e75504d99aa9db429fb005c3ccfde6aa1d9e9c4cae1def77793407039797e78522c39d94f25ca391fbd0b3efac8e92be3 (encrypted)