# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
728b2be842b59b3a628543f930ab25fecbac196b8edd2f2d8fcf501e64d97640
Pseudo Output
9e5ddc09923fadbc1e6158840bf6cd32390e599f4c2bdb755205c1591a35c415
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3eb32322611b982f68157a1de903f0fd0547db034ff0fff19f9a2953b648b722
Commitment
949da68e4bf2d8eb124513eda655be845c67c9a17052b4aa6984b3a5742a2918
Range Proof
672 bytes (Bulletproof)
Memo
98bd53a8272074b1388acc4d14d387c52e5e7aa86916e0f7b117c67cd3e7322bbc27478c2dc61ab7fe94b9f8bfc414bea2289341665850bf0adb966f197bbd80f964b74e79d76f35578c25f0ee3c2619302cb35c2eebab8cf3b7780c0064ecef765bba7a73a6cecf0ce56937e442d4e920da55a2f53ae9151da2eb0cf8ea4905 (encrypted)
Stealth Address
f402a9e5d0c165a5421f8f87cbf1b3d9b7ecce00a33a897a09e70d5d2f975061
Commitment
785be4c322dd6f906b905c5a9b6d7a4466688edba259f0de329f207d55d75c4b
Range Proof
672 bytes (Bulletproof)
Memo
071a98e5a431da0a7f661b80b166c3c3b174f33a8c6c0fbc03eac0e4d5bbc5b123dc4c67b5cf17779256a41a9eb96fc6517095a2ce3c6252e0ec98868f3b95c2158f22f5e1f6c015de49ecb7724eb6eedc787c53f72cd3b6e5ad230807d5b8d0a4bcf1d77dbc9108544547fa89d147e796a85a018fe14fc27f09eee8f3484443 (encrypted)