# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e307b0754186ec74a050a44b9d8bd33e1c093b1dce3d057481106fe7cfa7258
Pseudo Output
3c1c0cc1694a4590ae3b04e4766728c7858198b92afef73cc461edf4fe92292c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2847fa6c5e1471cc9fd0233637ff4879f8bd6685b6904b7c63fb7650671a806a
Commitment
0c325f971c445bd025934fccceea907fedb575152d886040a18303cda12c511a
Range Proof
672 bytes (Bulletproof)
Memo
9c530261715aed5dffdbdd014d4c853ce55775a7cfe70ebae8f230a25178db1f46f0e8c862281475981bd4839a205bd42996d82b9acc60809be114352576601e4544c7571f757ea69f3783655f1973839cea439bf5b19bfbd8aa5c1eec7733c66eaf2b40978d8088aa5a3b16a1dedb78df2e45fee86aba2b4d55adda9d67bedc (encrypted)
Stealth Address
c44e398f66abf9c9f76979263ad1c57f63d08af6a6bc5741ac8c94454daaff32
Commitment
5c7b2d00e1f6bcd9d9cee282be39f027ea27836a674e5fbaebcad85aa8a43c3f
Range Proof
672 bytes (Bulletproof)
Memo
7c054b95d63a056366fadcd0f271db2189e03f1dd3f7ae29bd54bf255c2dc04e58e51bda1fd39e72fea49bc185a3c473cc7a291128b8c2509808937b7ff76b3b2846ba7e6c2fe9df8bd797f02f50c548de03e1c3e12d656f2528fa4ba25b8cc0390363aeeca8a42bb5f1dabb21c58786282ebd4d6dbe36563f068418e667e038 (encrypted)
Stealth Address
4ae20865f7d96252d2209f0402ad63fb317f4660a1a177b44d873c838aec274f
Commitment
6414c5ff39bfe1f733636f843bf496b4f37c89d5ea18f75dc196fae338f8155b
Range Proof
672 bytes (Bulletproof)
Memo
bf2b2f4b9f4d9392a22ecc99133fd75b086e12a86cc73656af61c8e47c9cc0eee6e9368189b39e87fef7751b760d17a7699229a63c7b33cef4d32de8b6cb6f3b41f7f67b3783fcc6aa95d80672510056c20e7da7de4accdfe8948ef948dc7c4f50f1ad7c835a10c76e81168e0d859f0a52474719c0e4b7699f54dad1d8a346b4 (encrypted)