# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b20ea1454b66e1b98c8a0756dafdd9dda0c1ad81ff475e7efc327125626be369
Pseudo Output
881f590121d3b330e3b637f65256d956f532945d32940d97e609c4b849f30771
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
327c6cde4eafd29868a6ea542e3e82b278f2aab63a49a99f47653b6d4dae3b62
Commitment
7eae7931146b257545f96a07f482b1fedd70a7effdc727b92aff1a9797c42005
Range Proof
672 bytes (Bulletproof)
Memo
703d94e40af57127325c8d33de46c706ab53fcc5284223ab8bf77af0cda6b65ca49395c4a44ab71bc6118d1d12b5e4ceef3c3d1141f03485a7073b783adcc66231b4744e0e3dfa73f8cad1e5a38dc6eca04dcaea268c3781bb21ae4d2f968c58a5bd518dd8198c5665031f801c15623080f0a0b50de806b22fb9bb019bdca271 (encrypted)
Stealth Address
aca3f7ae9092984545f13400d44374188149585434fc15022384948168438d18
Commitment
686b742a1a5439a598814c812e51f65c592f04cc4a54fcf23c3f2b5f9f80be2e
Range Proof
672 bytes (Bulletproof)
Memo
c1f2cfee7ae5db263637c10784a9da5214d226f0d0fdeb591b656be5a2200cbca911242c62cb5e409692af99dbbf6baaf773ee99eca96b674c99426373c203307bd63ea273b3650bfe04212d60a106f7030227073932198448203ca21f33816795cb75ecc232f2782c04373e84681d894041203c3b9675bd3885402722273730 (encrypted)
Stealth Address
b093797b3662fc518a09e1fbf30711dbff711ac1f5936e61d58b5a07d02e1a3b
Commitment
d26f328e1e4f02a91102e34a601501a364dcb9777d89d345b3d552876bb12c26
Range Proof
672 bytes (Bulletproof)
Memo
d10c9940af3687a4c7283275e27fe7a1a13aeb5746795b967d1a4e92cead00be9652214da4477608021173b1bc510b0c7318f5a931cf7c67aa8f8fb9eb3e9e413a01e866a249d5102c7a0278a400c05c2110738549c341c6421992394b46cf20ecfd76a5bd055d48fd28ff0cd7f3735f7142ede65456d9496987a1df27ec3e2f (encrypted)