# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a949034b52edd91b35b419d956bf5bc6738fea37aff836b2d7841752f5ec37d
Pseudo Output
d8f30f2cf0f59df9f311d2332e51e54b5c14ea992acae7ff05306ff9f999ec67
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f2c32da52932e2d0baff0cf7c6a6a78fed60a00e33b1b8c445e21508e8dd6d7b
Commitment
661e73b047cc0fec52dba07d7dd262a57280b21a93cf0909a6723bdd13298842
Range Proof
672 bytes (Bulletproof)
Memo
0530715458ec83a76ac795d546ee3a76e6ab51be2b7109528b416bde94d1418b4888806a621c9d4d4a8db1ab59e0334ab6e2a7ac126040fc2b3dbb22fbfe74c87371d8b01cd19c5e86145b7f0ec4ec8d4aedb9fa069c5646c0b98ca834ed311e418c092d1e30439775eac32d2f1030871794b5ed16f17ff3eebbe12772243210 (encrypted)
Stealth Address
2623a955d76fb39db2e24f4d58df18d66932736e909b2ada46681a242a9d914e
Commitment
46284baec0fca1d9a2dab72747250eb5a2a7bf32e210f8b2d434ede750e36b34
Range Proof
672 bytes (Bulletproof)
Memo
011c4931a5765b8046246eb41831c4d48cf22d241a6ba240a7caf63a4e1320aa8872680044a054ea51dc939d8ea313aff66b1b568461183ff6555d4e2b81f92c4c1b9c34de14569615f7f7e6db58b8f21306a48e4493abbd5581ac7d802a10bd69cfbf0a557b88aa824afe05ea03077ca466ab8e0ab1e6cfbeaf289a6f1cda32 (encrypted)
Stealth Address
2c098018247c7d88ba5028014ac929a3f4f15bc56b42eb373ca111345d930c71
Commitment
7041a1d3f415ebc711efbe73b8ca5d45caa7c40feb6e87c6b6ecdd58dfd59111
Range Proof
672 bytes (Bulletproof)
Memo
f00461325dd0588b7d1994d0410a8e772d694550353cd994c3caeddae10a8570fa768242a63e4975352920f1d7eb87f303eecc0c1523e420c70f73f983ce15c51bcfc30b981d780e927284c58215c1462b3fb70a59ce5602f8d40977530d9b80d244fc87af888dcd246386840834a4beb25efad29d9f53f6debc2674914a8544 (encrypted)