# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a41a85ca80836973e3cd6d317eeaf3d794c364f75188972834ffcdb72e24e7b
Pseudo Output
f0469eb03f1cbfdc6d3cd9b685c32eff3cec78c5b87be719e3f7c6c6b5e66f18
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2a43caf477daafe2014e6afcd1007d47c61fd65dbb105d6f21af26f852867f74
Commitment
62099ffd387bcd685c13643a52dcfdd08dd6e32ebc9d1bbfe5ebc4914524096d
Range Proof
672 bytes (Bulletproof)
Memo
cf1180860630f85541917da1e0fe1ba61eb8b6efc2c9d60b1da589434ec250025e724b0243c08b99c9249deb50ae27d20cac3258ce0c72d47c96ac7436d5758bec742941a5c1e8751930251f207da2391ded90acdd89ed9a93295a74e1feac85cb14a66ac8074f15cd3e185d9afd0bc69ce3e0ee520909dc71a5ed7b96fcdb02 (encrypted)
Stealth Address
3643b2c03b147852e7f6eb75f98b601683a2a15d8320faf47d0a528f73a01633
Commitment
a0d0767983d620f4dfc916ae93e29ae5a527e0ec927dddfe068d5839fd18650f
Range Proof
672 bytes (Bulletproof)
Memo
f884e254745c5a7f5a21d0724dbe0d83b0d3dfa4bfb05dde7e1171a124e149ba2dc0d69cd1de6c25583cd31b7d43bbd8fd980c6b7ab53ba656343412cf0c8c8e9fe1ba822d3d4bb6f30e061df3ec3b105c4ab5fbf773ab685e62cdc3dc88538ce6c82f6afff822c5a85400e64eedea50ab50743f8921c461a734a2e9442618ad (encrypted)
Stealth Address
cef5bc1ed4ffc0649116be226d55fdde1c985010b1fad9a024010bf4a2fbb56c
Commitment
e492e5879737161f1362f8d94b4a34d6bdfa0648496c324124e39d2c19fa865b
Range Proof
672 bytes (Bulletproof)
Memo
22d266c1d93f0ac99c73138fe27b92b5c1755595bff3305032b4706c57d646a78fd3f74a1e41e859909874cb7ecd673ccbdcaab8e032a3484cd3c3702dadde4e9e680311cb7b749cfc10c23d11097e2436fcff4ff5b477d7ffa2d5e92ccf21660e95f291504e59e41d3bd47d9cab4890c0e3afd500be3828aa19c2a863447736 (encrypted)