# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3e4f16d745a0fa63a92a724a85345c4dce0e05bf8e6d221709cd385b8d2b4229
Pseudo Output
c4f46e8ef7b6cceb2f014b05bd1cae7e2ee2feefa591d906c60086abe4b16e7b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9ce7b5fa507d7bccacaf99a7c05e7364a5dcd99c3c43b12cfb0845b239aeb20b
Commitment
2ec0307d62ddd9340b9f63ab76127d49742284ac4a0ddf92d9a71c57839fcb51
Range Proof
672 bytes (Bulletproof)
Memo
2095263e4bf0d1e40527a28b899f7a70414177466970feddce4c2cf1742cc12cf200972b22f7f5c30f3d5c7a0d64062f4d8cfe8b10c20ce8c5e365466b1b667bb5cc765dc44634a0d5c8044b6a16d5931cf14b9597a0f9bbe51250ad528e100ac5681e48860acaeca6c78231d7ed94c036bf37a25540c163eae33b6a67afeef6 (encrypted)
Stealth Address
1c9ad4b35497d284b95b442d4e36ba93c6abb408092655d1a0ba7b8c33b00538
Commitment
74456d1734f8c70f8fc98cc54243744657d8e2729e867cd8cf2521a73a4d5a4a
Range Proof
672 bytes (Bulletproof)
Memo
c6d93d4e88c36cbcb4891c92df4674bf82eedae5fdd07949052b63d3699ed6434cb00fa359502f18a9203c61e5ab7ae606be53838e76fbc2b9709c7a804724869e6905f12483cb1ca4ea177c6a1a91cd34ef95cf05fcc9fb38e909a5c63e683d883e05daef9a3162bae5b1d2158e22e45786927f4008772788a78974b7912f19 (encrypted)
Stealth Address
887516d1eb10f5003f32d65f9209d67ae0ed76ac4705cea6704a5497a6df6b47
Commitment
72cc90e8e61940e242ebcf31b1698f76b323f5900ed027eef1832e8df440c205
Range Proof
672 bytes (Bulletproof)
Memo
d3bb17803e2e8d0eb450a27876f1cc8e067c4f928f058de462adaa817f05da736fd989f174f2b82114429d32a5edf9978205761aacc3ac3d0a45846edf994565f4d0d0c581680719480c91aa1e86d9d9443024e38bc6b8a4e8dce9002ea7b25bc5f256961963599d4b434c2459f8a4a2aa42cc125cbb0f09b1c5c4e118b49f0c (encrypted)