# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a8d5c487c57323ce64221182c3754b49d81cbc9a494e7d4bee1a411db1e3721
Pseudo Output
4cc6e7ebe4f461e8a57a0ae618cfe79b7862a33047579484abc742ffa7a97f79
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5a5fb1cd2131bcaedf99bd0f83e818e874d3cdb05f1dab9a2b3b54feed06c36e
Commitment
76928bde9bfbe56cbaf98d3cb89efc562ca0cd1310562ee35d5728eb8d80d370
Range Proof
672 bytes (Bulletproof)
Memo
3e967009abc1e53b458fe3d0a42cc808d38fafc87561e71311282226f337e1049f231a93a2ef19274347dd1530066fc135fca3407f12863b2f44a558bf63708f29baf8b37428568a69139c57a15302e6259d2fbf7dd849d6348f241209897542e894f8d526894249d00e9412dc12f2be277a224f0b48a5f794e3a739850118b4 (encrypted)
Stealth Address
f2c472d047f638138b308cc78f65717074e93eff136fd5becf1a07e4be4c8860
Commitment
04eea11cbc460b448a56f2554ac68fb856789215c3d0d1f4c5a6887223bdda66
Range Proof
672 bytes (Bulletproof)
Memo
c850cbf50bc9293e31330e9157082ccaee987b9c62203c830153e79d7a4342164193f8dd45560a6eb67a262bac5e3bf1ba9581b85e3c12ac91e96f91d83252e7c85da904a5720efe3d4df6eba182574fb9b7532cefa77ad05e116ac5952f4c4144e6829029fda9d7fdb482726b383e4cbaa3f91cb9869415416dd34f62957ae8 (encrypted)
Stealth Address
46a0e550e035e745ffd3d119f00b6a4e0bf95fab3ee528ff7306e9ccf1900c5c
Commitment
188f062fc1a71e136a98028f23c66eb0ad389883ce56ac49c40626c2072ae642
Range Proof
672 bytes (Bulletproof)
Memo
5dc904a0b98be7cc3e55474a5f1b2c155ce548f40dfb21808932ecbea9ba98895dd99b6c216ccfe41d4cc147892fc700ea7125a75f591eeea126db99ac38e64dd6116b687cb2297b2ce6a736ddc655c6411b6d759f89f42201bb3b52b301fa37751c60628e0456885f02bf8710267b0e35ebd49a21e2c67e4f2d9dc943160a65 (encrypted)