# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2aef2c45f3675890205d560e367d9093e568d292f7544bccaafdb81d876f947a
Pseudo Output
5e9eb6a6c74471817be3c07d6332b0b73c4964d015860857ae7e2759b025903b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
32690e2f551ed4afbe151b522a888c8818c336d10736997c31fc90603e4fcf5a
Commitment
7c20b9f48847791829dbe85e03d7c28c4f6beaa6e042ecdca33c6dd4b1abad5a
Range Proof
672 bytes (Bulletproof)
Memo
2633adcccdb30800cf46addd95d8637dffc5f974faa301a6ee4b7c904bc6e14239950e22f92c785d3d4d00937ac8068e1a34ac63bd3bac1e13edf60604340552742c41fbf98b78a4e2e9515034cc40cc35a1108d536924a8260ec2e6846a65e582f8fc6d88febe2ca7cd16748a0a04ac501a19d95fd594c5f5f88254caa6f1d4 (encrypted)
Stealth Address
482c105832e6a6b0146949a3140d2db83429fea8faef8700804f7cb920714637
Commitment
767e5ff71ec8dbbfc6ea18e36a9f3bf3061d02c5a69a705d14d0dc3ef5678c7d
Range Proof
672 bytes (Bulletproof)
Memo
de93b1d885316a91aa7c1dd17feeb9037315afb473bbdfac6d96de7537320224d5b775ff903703d8af17ef8cf0f81b6a95b98214ad836b4d38e7307fce0edb211e17ed0db7ab1c53b0b6318c85879468512bd770a5617cb29a811af728e63394241cca1377dc181e0db527d064cadc7e23864b6eddd31261c059bd09b10fe1f1 (encrypted)
Stealth Address
c8279cf9bb8a65c33dff4ec3d938a650e16eb799aa1b4c03a841f2350e5b8b11
Commitment
b69cad2cd3d581d79d7ef29d2d8ef4de5a1625a1e9d68008b87c99b0dd0ec754
Range Proof
672 bytes (Bulletproof)
Memo
d886ebbf7b24abdba0f6b79ee38ee7793dcd715feed45411864f7f09976e030720d929960030a789f3c3a2d2b4430c51fc7d332094c9817320c9f171cd9cb3a8b16b0eaefa9df6c602ace26292feaa391c1ca779663e2fd194e1d85aff4daec344817cdbbdc7152878dd489698ccad3129ef9931482fef5d5e729afbddf9c7b7 (encrypted)