# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7eec6ca6e65f3bb0af4edeb1f73c145685cf051451761bfb501a97070d2e3b67
Pseudo Output
3ac348f69f4048a15aad34ca4aa297c173c9c8a960eb5a633b560d8f8f790346
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
32bf8ec0622b7716f8a36651cb676812160268b697ba6b3236b370b8b1aed408
Commitment
828855a2bc05a9bde30b71f9d4f5cc374989bdf429ed7a3ae78d37423df65758
Range Proof
672 bytes (Bulletproof)
Memo
531a74111d1d34c0047e427937cadb1d5894064ac8e89b5e565896d6c123350d8715f95f44ab1a6ed0df93e07c3e24e44e898074eb184bcb8bc410a6cd147488f2d3475a505821d2a0fb022b6307256967453db23d7603caf0a06cc2493dcc8e6b3555f8e1c57362317a5082e803fb0d2cf1181d125f237e4024179515680ff3 (encrypted)
Stealth Address
3081989434a54ae56f6280beed81a07fa1a7f470fa352dbf4b3f9f4fb450d122
Commitment
4a875858ad3bbfd71add18b13b9f0f3c38c689dce80b3ea965f72b118c0f6e63
Range Proof
672 bytes (Bulletproof)
Memo
803bc7546d8545be163117e6b3e970b1b3bbe10593144f2cca2ca0e262d9a406b39d9b1cdeecffe95fabf619031f243b3669b066d5015568e602a794031e8c674a02b523e3cc952efb43a691b9ed66e2545ec9bfdd96c5a4d482d9a75efb1de841e4a9c838870db1399753efb56d26d3eece38bf39b44f200bcb5d5eef81f7a3 (encrypted)
Stealth Address
d48ab43fc6a4b568ea06553fcdeddd6ee0284b80ee10e5ddc0fa645a3e6e1f16
Commitment
687815b010749ed6f9c2347f15fa27939882d8353dc919af88dd40ab6cd7c528
Range Proof
672 bytes (Bulletproof)
Memo
a684b7e289cfe6270bdf0efd8edf6a0811324b440dcb75d476d05e255cfed235ba310d4c7f62603ba604d01f363b8f9cf3a0b14c2e234b9b81988fe54b10ec623c413be515756b75648ccc46268562fc28a7d880ce38389b622a711e1a14600eb2437e9396ac7f0679cee36cfb38d504c07619c632e9be7e77f25727edb9f434 (encrypted)