# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0953d3fd4ef3fd20d53c75ddfed04419d6cb0ccccf0d526174a3f889833f92f
Pseudo Output
44f1e5bf9c299b9e08a5858b0e7606852ed965bf0d72fcb83d8f3932909c8d4d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3ca9f2d20f831e92bf3c56a66ebd66cfc66d8aec18aa0491e3fe2485daddb658
Commitment
50442e2ccad7dc8973e322e8c4c63abcc12945328a09ca0b128c47cec4a61012
Range Proof
672 bytes (Bulletproof)
Memo
59498e1c18d4bd61f5cc179788dcfb62c4619aec3c4ee87c788ad634cc344134d54e14243b66f206ebbd4b1b8c7d4667140818bf27c2acdb9f0fa1e9adc68e1fb8d290b394dd1f442d11d82700353268f722a405d4885cb03055859c988e7eecd4f3c4f2e2d36b8e424aed21897a74730e98efd599a7d31a3e3ddad42b7e0c1e (encrypted)
Stealth Address
64ca19cbf3f13f6c524a75be6b0788a48e2dbbe1e35cf21a570d9e70e221dc2d
Commitment
06ea25e2bc020e2ed8ce3b9a2a646e3245b236571b1172bbf24ff255869c5643
Range Proof
672 bytes (Bulletproof)
Memo
5891987b4b6df0fee619c2828ce9afcbd2a01bd41c1e6dd239164d9b7f01f3a4e1d61764693ecac2d563de4b7a9c516603880f0d9d26897aadb60be1447bff49cfb0f3aed42539c4a442eeb7e28a83d05b3e6c95a3fbf86eabca6e28d6e225aa2cce7f487bd791f9f4ef7cbccb039bb01857367a7d4d26725df3959774f4fb25 (encrypted)
Stealth Address
7e14109da544cfd21da8e431e899054deca6153074c8baf72f8640eb7158be12
Commitment
800e898fc753328f61cd8362e9e0aa697323feacaeb33ac722e9c38797a74b65
Range Proof
672 bytes (Bulletproof)
Memo
1531c54e6f0fd9402e9a8205836e5df52770850225136d50d08755d9b9f0be2c5b79274369e8d01a3a18ad8cc3f2c928c1319b96f5eec5b0bfdff8addfa6c057eff8257e688fb05faa1013981c71cc64004370d9f12032abd4e801ca36783df5dce947680b35b4dd8569c19cbc63b8f0cf74690900f9b58481ad858bd33085fd (encrypted)