# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38420b8029f3e03c1d270694642129ffe395b37d8785eb5f72d6e49f48fce166
Pseudo Output
22a7816ee5b8991c1a09702dbad91008e7dc04643c7aa1eabee8c756ae0bdb14
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7400b2a1a6c9d3c07786155b2618426db8e359e3f24ab84118d49b7e2e65e417
Commitment
3859a5034c35ddaa9984f948e0c558a6f911eb548b5b105eee59ce0cbdef4c7d
Range Proof
672 bytes (Bulletproof)
Memo
3cdd9ef08875c2bccc7f8af999d49f934d6d7f660546bc8d328d09cce25cdd15cb7e61450eaf319529fc26d2431084ccd4fe826ff1d653587fd761f22d97002efc510e8279ce294abe8b4d3a490d97a7fd71ff517fa2c172aebf870ee5e3c2ba2d8c09f46b464ac4f485ebae5b498920d4e8f4425fb5aa9504c53907607ec7e9 (encrypted)
Stealth Address
3ca02bd34b852ea76dbef9750f4a1f603836cc49505b52861cd84676babb0676
Commitment
a445cf8d50df9a39f6bcac0737e075fe6d6689153933ba309c876df0bbef555c
Range Proof
672 bytes (Bulletproof)
Memo
e2d7c3b8abb16c758b267f1e0977a9c74aefb74eb2d1f7a14e6132b8a6dbd788874eebfcb597c757a73694cc88bbeeaf6d5ca5f59eb66d7dd7e4b07b6d1f85224b5d37d93473c0704b2371e4d2c36fa68b1673f8a27df9b9bc25d5aa0037b05ca12ff5907ae5de39575363005a85bb76fe26c668325e09f88a26f47d89e52d37 (encrypted)
Stealth Address
2cd3c035e336b28c5f1423189bd889ebef7fbb6ede52c976d1923a591c416600
Commitment
16ae292378a8f54833d59f87a58dc2d90c6542ae0e575a32e986c392ac04667a
Range Proof
672 bytes (Bulletproof)
Memo
9b32cc58c771d731eda717c1d33164d31e7daf4fd1b47a0fdae3c24af5c3d9af1f1c19525981bf743654c2c1a85b65af8cee0c096878573f30d11ce68edbb44012e9257afa8a2044aa4cfe4b5485039255e616ab50373ee2ef7f559f49afef264c03d10bfe4fa19183e95c876bd5cfbea4595a38b19231995bbbe4825110ff51 (encrypted)