# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3c02e6009259f9e9a68434cda9b4d2503bfc72b79d238759beb1ee0312841d3f
Pseudo Output
88c7da7b23eb7497fd4754c5fa0152d1db573464c6c6bb68c5450403a16d3839
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3243649d20dc80bd3777dfe07aec5b54ed3deff5f889ba295e9edebd03f4c66e
Commitment
ec3e06e24ea8bb5dda541171feda0c6cc1b7a9dafee2a9bedca0ccd9bbb7be4d
Range Proof
672 bytes (Bulletproof)
Memo
7e7678c5a1d3769fb79486d98dadd4332b2cf8fbc139941db91e8fc9be6f5a7e433e0690bc7107245223f509623418d86a9fcc3ecc871c6276455f8441e983c9abfe35104e5ce5d329b4432a7799e13a4260a9af65df5498b70ddba106c346bf9c719e0dadbd7e300115841708953264bbc053b6e977e235f8b7a7324bdefb90 (encrypted)
Stealth Address
bc3cf5fee7166e102255865cfc1895eb4be9dc0d7c8bb03b2fab3021031de87e
Commitment
6cb3005265783300119abf36fd174eb78a8fa33053712e2eca179e5d2255df64
Range Proof
672 bytes (Bulletproof)
Memo
568f94f09ccd1ffd7e6b730355076c980b8dc033029cb25140d75db3746e6bc6bca804d4b04d22164c9b239318cc3bf23ea710b78fa2994c92c6469e0a104bf0407cd292dd6b109cb874c3c52388dc61bcb1055194395eb697ee740d70e3e216dd8660940c58ff61a94bf0a013fb48bc22a55922543d677011565f8209b3fcbc (encrypted)