# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
74e6ddd654cd6149905aa4e52bf505d07529a7c808ce0350ad210b4dd4a40d47
Pseudo Output
fea198cc41cba02a80fe70bcb04c9f5581c9087abe1941a99e1e2899de278011
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
32c8b785dd28076089676cad15f79cc987b75faef7e6ace9a8ba02ac4ea8b477
Commitment
e06c41a7c6f5513abfe72b9a8d5b8f2fdf13966d68e2470ed49d5a2be0003460
Range Proof
672 bytes (Bulletproof)
Memo
29fa1a07df18ee81b55642a393a31093569f2539b1790a273139defa3f8f70a0b25351fc95416960fb3eec13913c16fade67dce3c2ba87ed9adff8ad1b2efc34596ced3e11efcfa93c024991a8d872d147c78e2bdad740d5f6314d3538becf346955bd5e1116d3f54be28c4baba58689abdf4bba3053a34c5219a0ae7399ccae (encrypted)
Stealth Address
605b4a782034972335af6f8bf73e52e6734da4509c149ae8a1447f5fae661a21
Commitment
9c401c41e96dc70756e1d799fe398bbb8b2597489c0568a916847f961070b85e
Range Proof
672 bytes (Bulletproof)
Memo
de6774412e1d430f17bca5fe3f0e8a48d008ed473bfd485965073076b50486a208a564d584f9d90ea6856cf5591eba92a2ae9137deb17163ae6fd5b096fb1ffae6290b1d52b2d6d2de282ef555c0d43af91247176a729fa782cf156be6c9df7120bff9b0d2878d1e02c327b9aff5c14618fe23b350d40e7b7c42de99a36e12cd (encrypted)