# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7cdaeca4368273ff0573299259e92052c9258d44e2fc9a681edd80a0bac37b79
Pseudo Output
5a7ea6d1c9e2a1b2c8597850fca7904fb02fb639c1818f343dd098581bac3c43
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6046a1a5d6eaa304ee50d5869600095269373ba2309fdc6d9b53c350ea0f7159
Commitment
1eca931533b7572bef630d8a95a21c39cf24a41ebe51249107264d25ab306a37
Range Proof
672 bytes (Bulletproof)
Memo
8a9faef83022cc0bcd1906673b173a9f48c49bf70798572eb3029db0904a075722d801d295df6a6afad266bfb9d4100f2e6d8d4cf9572d21807dece6b1bf0f24ae4defe996b8738aad5553c34c7afa14e8cd83509a5d3e0e2d63fb05309efcf7da77959429a9531776b28046a1dcbfcd4d1e65859b4e4cc636626234e5bd9675 (encrypted)
Stealth Address
14d7d1154ad0d4322fca90ed7a8b5a49dc366bfc0e544b942dcdb340a8450e33
Commitment
6a37b71ac917586afc5b8472d12ee95099f8aaeb25e53f4a028711a25688b93b
Range Proof
672 bytes (Bulletproof)
Memo
146ddabe4810ffddfb4b18ea060842b45e4ff4f8c9d24120a594d41b2420a551c61c4420750689cf4bea3b7056358553cd9e91c1f28ae4569499787084ed3364c8bccc07472cd139ded6b811dc00a25cec64d4946b8a87796278c54b45577ddd2fce0f85b97116b2e9841429f010eecdd26729d4fccd6e64be9c2e31456abf0a (encrypted)
Stealth Address
4cfd044bf25c999c5d46f6a608544150eb52ecf9f37a7e2c990625486e54d003
Commitment
4c9ea86f592e5cfb51370991a806c7d0d76709d28f68935ad014614005e7eb18
Range Proof
672 bytes (Bulletproof)
Memo
564add8116c488003bdef04c233a9cd53e813b7e161680de11b487ec51e52e5cc8ff07e71f01ed7b49b1355ca091d6058e632963aad5001052d55634d615bfa8e4040d2e6a2aafeb90fe3318408eecaa3dd2ac4d388dd5d824151a9c2d5b37e8b920706156fc967cf6eaac4c645572925d3d7e55039888f928d2faf6884674e1 (encrypted)