# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dc991bf46dcd3650b33188e985f3c9b9588ba52599b99fde5f461a9c50bde917
Pseudo Output
0cfef3e9b2c4fafa9779adc6f1dda06c4ac77fb02fbc561765bf4bb5b58f332a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3afda88f47edbfbb58120ca8f0ede416e983d796604412a0c21936db31bf9a4a
Commitment
4a2c2ce401483ce1676c352fea1d6ad87fcab2b85031eb651a78b209e960c276
Range Proof
672 bytes (Bulletproof)
Memo
597d7378e7fffcacfa46cc9aa152d877549e5977b451f7e03d74d39cea82c41c3569536bfe3221b66b906e943c51e59d0bbfd190e36fec79e485edcd41784a033507dee46e665ae2f28da40a67ee73c830b8161350a0c45d0713752a3f9e69e8c1f16b730f4a6519662a1d308ac8936c78ab1bd3c4f13b6edfe2f7c473f775e6 (encrypted)
Stealth Address
7c8bab5920dab00a4a79ad96b5da1f39681f803de7e15f18edd8b3f90d1c196b
Commitment
6c8ef87146d99966eec5537faa700d03d5fc04dda6e93cf357d2b4afbc08b14c
Range Proof
672 bytes (Bulletproof)
Memo
4693dbf8cc3bd62e110e32d5ebb71a91279c02736245bfa3d3c31092b222e13c0d9e1931ab2905df37fa4a2eaf0c7d7b7af414180f1c0eb2fe301cd4c8e563d37103e72a6a949d27562a8ab19a8080ebe46d53df2d4de5aeb9713a8753888a66c079c7eaf147e3a2cba2ac974b4c45b1cbd1f909788835be29ea2fde6a58bef9 (encrypted)
Stealth Address
28b9f5f28a7aa4fa4a9d390c30d4a8a21e5db708073f98b8492e101cfe84542f
Commitment
54df587cbbeac25bf88ed4eb96983c8d9cfc1f689f40b67348eab682bed0f113
Range Proof
672 bytes (Bulletproof)
Memo
bd5014d65c991177c0701009aa6c3a0802134c50fa87a5249c91ba92be0e77369a00e412eb00e366c63b93ed580415f015cbbbca732b74c1230d9484930f5c1f48446d93f7c2376f9b4fb0f39ab69b8e0fa0af44431249579d40b0c7346050b8a7468523f548cf5ae1b858095755ff26e258239173b193fb0db552787f834c3a (encrypted)