# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3e1dc2ea0d6876f0ba8628c41dfc1c9b57ace30c88ae008f5440a7ffb4fab259
Pseudo Output
184f94495afd920f4c87dfbd0e5b5deddae07ceb4d04443d836698a6d3ece60b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a64d11a3196cb6359ebf28291c3b74e4080fbb3227d5cfdf662c2ea3513e680e
Commitment
b82d16aa626d4dbe35f6be1f22f326ea8cf6626a6ff76a8a52d076c4a8cfa21f
Range Proof
672 bytes (Bulletproof)
Memo
73cfe79ed36f3e775391ff84d173ac0663a0063bae4181bcd38030ac9a3a3835c19f61d41e6e320f97bf7dc2ed2db7ae5cb08ce339076aa779f686c129b0ab12fdf3a6b908726780c8556914ff33a654bf1ebb8e6a5e6b93b2a9d8638c31596fd1cf4bacf5a25356ba655d8145b03938ab5d7a47219414f0eca39fa7945dc413 (encrypted)
Stealth Address
0e97d43a7ebb1f495b15f7e251a330d8d92975b93a92586d45e69fd36b655206
Commitment
34f3ff4f49618dda3076d5222e3cd97afce3a1a9d2b59ec3dd069203bddf811c
Range Proof
672 bytes (Bulletproof)
Memo
6d42bad93a6a94e2f61c09a4cee511cef5793855ade74323a4aec0be9adcbff8055da8ad481d7508a3fb96e8aa65d7d607b712898ebdf314e50d4eb1eaf5e85763ee99ef0fc615651437217c91018e254d682f9c5a7968aea9f9fb1ec5de79fb04229be6c0633fb1a1c756a7761644c8009fca3e1fa15d5a0421a324a9a424b3 (encrypted)
Stealth Address
e67ab340046fddc0ce278bfd133116408fc50f0c4f4bb9bb5283133077da4a41
Commitment
b2fb59bb005bcb9d842784c2d9769f40aa5b0b23023a9d5894a6fed954209149
Range Proof
672 bytes (Bulletproof)
Memo
271d5bddfcf6a155b413f93abd6e63464b5fd0e9ea58f219835c91c49db9d276e9ff249e842aba0a6d44a13d833f2cf9c79d00501184cc76f20116fd98ea0fbe215e64aea663ecebf7903028e1793662ce8198b03df02321efd57c08c1c60b55ed7c0e5e7435807241caf85e283b7bae1c4532ff927b71c1440d00f73e3fe440 (encrypted)