# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea983f5515259291c2f8e2151cc79f4e002e23fcabf6ca16b51cf6289eef763e
Pseudo Output
922ab4bd5bd9e7dd81f11d783be2f4b124ba00ba8f768f83830e9d55b36a1c07
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
00327fc8003dd4862e999cfd231d77936262926e75f9dc42602471d24a817f72
Commitment
224fb9207e2fd5a32690b0a8e4ec44d37195d22fb9afa4cc73fa95d5a0fabb3a
Range Proof
672 bytes (Bulletproof)
Memo
06414b919110e1681d4f2c12184a011bea8bcb0797cbf59193beb5b1055ecb621ee0ea743ab72c6b58031139562b4e7a4fb5a25d6ed8407517344d5c37506e180d1d67bbfe5279afbd11edb83e93d94beae56e38b96133a803b4aa1d44277991eb5f52afcc553603778f43008f2a86129bc8ec33b9faf327e3db48271a4effaf (encrypted)
Stealth Address
4a5dd89ccd57247ed79fddb7512b634c147d94d0c04c4a698bf9184b7bfee728
Commitment
62c2ba9d43e227a26e487b42a75337d7c1d886f47099c81e8a8e47325e816729
Range Proof
672 bytes (Bulletproof)
Memo
31d9f440a9d0b1acdac6732472ff426b778db696493169e30863474735e59adb6472de75c444fbdc3cb61b6167e6e141b708ad1c62bcda3d98413571916ac60285646271deb1f3c668957270ebd0d2059c6f6313bfaa74efc86d5ee7a817e8ecc90bc16ad3f33ca5364a7bf0f7e7cc2dc0a18a68ee4954df82583719a9312e5a (encrypted)