# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32d9ccf8603bf13672fc26e62886e095f3a37a2070368806cebb56644cec5d0f
Pseudo Output
7ae72838ec430c0dfe82f5d5e80f8361335604fd836cdbcc3cf4ec0b2843cf30
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
663f1501407a54d22d6a7550252770c9ece7141f4099e287a884141df228ae57
Commitment
5cd3a6fefd729d3535c259890d3f4acc00934062817ea3aa6d2938442e159412
Range Proof
672 bytes (Bulletproof)
Memo
17f2f14125ce25b2d7a8477edfef645306ecb21f20ea1b0b93f0f26203e5ab8c128e8863655cff3c2a5760f3526ffcf15a26b9504cda058832f544b32ac6b4827160542c5c1307dae7ee6156df7e82833e8628ea9e5ee7d3af768eb60483317eb4b5e14475c7e7e5b148d275b2a8ef0da090b8e559611dafd405947344588043 (encrypted)
Stealth Address
7a2ec2401bb9efe367517eace887bf2b7d4695f815500cdf8cd1ea2cc9552a4f
Commitment
c09593dded4c25edcc74921eea3e22ee13476cd7fb259a024597ea1417c4c110
Range Proof
672 bytes (Bulletproof)
Memo
e01b70f3afd77d5e2c08abb36bea08bf08d1a727b4d7d787b33667f882071725b6faa840dfff0b48762e50d372850ff9fdd8f35da1663e5a65b8b745929d9dd92e4168e9eaf20c3d0a9f9f38b397ddac7cbff94914704fa6ba319038933247167f4a6e4dced3bad9f69684e949bb61ce696472a2aa74cc932c9cd6b1da74b1c8 (encrypted)
Stealth Address
38a8c82fd23ba49aa05efe50e17e0b7938d97d013081163ba2cf40c796b00d6a
Commitment
54c5496ab07614112f9659a5db4e315bf8a1f1f14b514d46f689fe6bdbec532c
Range Proof
672 bytes (Bulletproof)
Memo
b181df6f451a6603f0e1807898799b6e583816d0d722568eae5f017942f855b67637f5bd35ef9c7d0fc8be83933af5c496e714509aa7568b2d4f8337bb1a8f27d1e51e61b599c84947f122c8ce57b80c56bd32fa1ae9db8140efd8c165c6367c64c06480cb2007bbb4085f0bd6fc59050d760757ca1bdc616b8281fc19f2ca89 (encrypted)