# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e8003e52578b3bc5dce19a20eb209f54bfd8aaaf2fb99b72749467eb0c570d7f
Pseudo Output
06e71e9e67a55d488253e6f93c8cc2d9e613f4d16973b7643eda93cc75179472
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3eb352b502fd43de342401b7db212e0c59c3332e6a6942dc6fef861ea5f43915
Commitment
1c69d85e8e946128cf73341a7f507f6b123c0054bfd4cfbfc09730b32a7dd325
Range Proof
672 bytes (Bulletproof)
Memo
afaf0a88fb419a03cbbd2b1f952801a74e23c740c59410c6f7b4eaf0dc0aeb62250d968f2bb2102d42ba7fdccd95114945b835137cbd1d8aeb7cd67eb4aee5d1c8a69c7000f054b37ad0f984b0f58a4dae2a03935320c8c380f6f216949fc26ebfe34fa55d1e6df3a2caabf0684a245fac825d5be002ab46970930614223daf8 (encrypted)
Stealth Address
b04b66a9fd2b8e654d5d85ba616d15a6c5f58963cc2e69af1ac84c924a90e560
Commitment
a04d5aa5f08904cd31902f0de8f4af3c4795e0a835fc61a08714abcc6adb7972
Range Proof
672 bytes (Bulletproof)
Memo
983f2de58a5c625881b34930395a30c186b2f8ce04069c9e459984480833a4ddb1dc7b8ff2928e1df3137fa94ff0a86982ba8e767fcc6457d86f9664e045eaf784d3292dc77250e27e5601e30f2b2df1260269c653c8863e67965f03ad75599c81548044723666ec92840242dd8e81a8b0efd6b620b40234a65b0c94af8f2c61 (encrypted)
Stealth Address
28a047f3636ad9c8bf87d489c1cb8eb8900c289a566466c619dbe14c680d582c
Commitment
24740d7162e91c8bc510ce2b432ce3b21b995397f8c70534af85a90acfc3fa77
Range Proof
672 bytes (Bulletproof)
Memo
41a6bd175d59679c0d4c9ef7d7732cadb86163806af7b9dbc5cf1c17b52653f6c2e2abecb4af739c421f15ee128a236fa7beb13f73a134e7fbde4d587dad238734150370d312b49182a314a11194657da0add8b536e5f77402ef8a51c55212449ca6345821f907731e3dfd65bf8611bc0f032f1abd8c9c86c687193605ff3cce (encrypted)