# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
36691e2b53b712ae6a5a8554fc0f863adfff7574d1e875927a834961aa0e9441
Pseudo Output
a02df4512e2dcdf0620640d51334430fc34aba6986296485b90bf6b53af5506a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
40202fffe44f46208cf580e0550127f6bd366db3945c830db6a095d786adfb2a
Commitment
681ab02121a46a942dcbcb1602e0e2d72d25f886af3030e06d89b084774ef06e
Range Proof
672 bytes (Bulletproof)
Memo
eb66135fa23c887f18009e7b7f8bc17af7e9b6847fc94080d5b57e673b8c8f7de2e87511994b7cdaad6c5ece16ba134fdceeb0b84f52c8cd79c9339fa4170e1c04ab12f831f647328360fe45df01fe387947a2c627b8096b0c5e0d3cf4d6bd2605f647909e2b288c1b4b8aadd5a2915361e0ed93d971455a55528579c3b7805f (encrypted)
Stealth Address
8af31c6690d74b8dac417f6c81814bfbfcbe5845d8d29ea4c91fd7126e27a629
Commitment
5841f921e3b8b90a9124a2dd7b12f4465540b655bdcc3f9c15781a4cc1f9ba3c
Range Proof
672 bytes (Bulletproof)
Memo
4f3be1938d9df090a6f281e49a2b43613d863c5315444198a9b0c3aa24f1544d3859e695659649924d957972f8b6341b08f38c954dafeefa8c3d304c1f25493f22d2810499f56a5d1f67b0ac1a98765396f24cd6ac2204c61862d6d1b7a41538399defbd4f642c2c93b3decf69dcb889eeaa3f2632c0055b13079d52563b74e4 (encrypted)
Stealth Address
a8b85859a96b6ca8aa11211a3ebd41fc62d80c3385c5eee086326200cb6a4a0f
Commitment
627bf520b0fb0277d93b65d639ece10751f938d3ebbd6831cd69aa79aa9ac34d
Range Proof
672 bytes (Bulletproof)
Memo
6f4e76cf0bb562aa02e7e130b7473b79f114953319449eddeca27b54203f99f46402fa52accff1d9b35e8cde67bdf4eccfb3ac9238e4d3c92c24b3fbfe22ce8d0588e2d2a49a6584a05e5a048dbe108f485f38097e8e265b1ac69628ef94f9bfc049248b65dfcd16304f0399e4e9370e1a685b397b0ab819d1ff8d9ffc996602 (encrypted)