# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
52f03a578744dd3405470f4281c565df1eb5ea2ab4b5fa1084b587a6acc8e238
Pseudo Output
48d2e18b7018782f4ae21662a40011a3fd5166f220054c892a0f55c1184b086b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e8b414bdd1884a3e87f5bebe9eae97a826e4576155b9d18ed1a58cea9887718
Commitment
40a2a7ad1b450e9e91245f9b0bb76c5d4daa6f62a59a37e7b571addf0bdde942
Range Proof
672 bytes (Bulletproof)
Memo
3b1c16737ba019056f05dd6bdc1962d0876f00fc630062bbaf2e7b60cdaf243b72cc9e150466b3fc09c25f0717ad48cfba59332f461345084a1f0ac8a71ef1610a0e2ad85e00907b5a23ee57edb64ac3c6cb57cf9b3d0e650625d2c2cf42ddc20bdadf17fc6bc87c0c057f8fcfb771886064dc6359e9006f8c0c2c2e7e068391 (encrypted)
Stealth Address
907720c251537cd2e06a9920f5513886717531031984ca5024d17e6ba8d5e402
Commitment
3a72f457e87b6bf191a7279e46c4b89d2a878772be11c68664a104cfce8eea44
Range Proof
672 bytes (Bulletproof)
Memo
6dd3193946fad1ab8fa287b145df8b799737064a1187c5db21691433f802e02ae0769bf32ed64be877d5565554203e786a026b5062358f41c0a7d27dc910e0c86038aa5c22b126587bf8e641b013a40fbfa5c7b4d1c0ebce7b1aff6c64bf423312b9bbc3667866f330d2043eedaf77e99975e4974321484cd4c652fbb6a3cde9 (encrypted)
Stealth Address
e07f258c8e701ffd000f44ffa2ebea3381dac53dbcf6c83065e8b4669c2b704a
Commitment
fc738ad3be0fd5ca07205a30a36e46920fff76415c9fd64644e2d3ea52827207
Range Proof
672 bytes (Bulletproof)
Memo
982d869ed0a13a0e36f188283f0bad3285879e69ffa20b4a2827b92261bea0c350e8cf574db930fb8c772e6993c1da7988b573c3c4aa35afd480db257e2f02b526b59d2185318c91b0d513857629c64dce949441793d2d664092100e73a2ffabf2cd4a5734f95f55ecb3f8db723d87f3ee549207b18e76b007a39ac5ffefe388 (encrypted)