# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7edde64dd0e91f730bc5374d0de90b21db46b658ef177f43053e9a11bc586f6c
Pseudo Output
caad42bd34f952b44935687e54f27ffa71900facdcf0253dc32eec2ca0b2e63d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3246a767951f0842a217e98324e0e894723a5ecdd643e27012c5c4ab5175d828
Commitment
b2573e6fb31d35d98ec4dac6a77a9862ba50b7d2380a881903cd5a0e465cc574
Range Proof
672 bytes (Bulletproof)
Memo
381c416944c94c94fb29fcc4b1e2ba7a2bdfb6fa865f15181dbe1b334d6c38728b32ac2281e7c80b370a582c2ff86a616bce1dcf9ef2267b07414a48b32890b27bf63b3128cb5ff89933f7d018201819769263a1691f4790fac7fa71b7ff20706d3816f5ea8b1f3e8e8da5366c1582d72f1158c99eaca19a9989165f3177a56d (encrypted)
Stealth Address
a26bfc0593979d1e8b178bed00d78e5182692778e0933577492d70c15ff42a35
Commitment
c4d2d025c5eb12977cb87de8ac5979ae34479c8dc20b84189d7aa019db95d92c
Range Proof
672 bytes (Bulletproof)
Memo
42d8f5ed6e8ca52e3ec273379f1783e0433f65a676a049aef4fb8b6fe5dfe293a08a0dda5434d1662a9411233e2a230198d0580b9ff77b68ad86a6b0a5b0bc83cf384f1670efc26ace1d9bdb31ca799a2ca89f96e54f4468a03ba0aa02b742544594b6eb80836f7e7b05287f24e2d1b6bb836f4e3c00b65a0aba1afc3d344d9d (encrypted)
Stealth Address
2275cffbb4fe366bbd9477d72cfb583908e2a690f8ded1fb7171f34769d53f2c
Commitment
beb9b0d184b2087613b7c54f5a387969d8073aa12eb543291e3f53e62cf63953
Range Proof
672 bytes (Bulletproof)
Memo
f3f8c7a8e29bd092853939af8958e24048e93f82d5f6bb7e2bf50205776224911f0b2a6cbdf460a7f1bc5d053495d30b4db7c1453978ec4955780affe5bd1a0d68df3cf2b443c3ff798716393634be607d245c0d92c2345a442c6647b46d5a942be7b54a3bddcb9fe418d798c9c2ad15f700c3aa529c9b0e1f7fb6bbf22b394f (encrypted)