# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32dbad7ef6db0fbced0837cbafed5d1e3c8570966f2454ffd8a510a70be04965
Pseudo Output
fa1bdb58412adbbcf5fcb9bb2285f234506558e33317528a33fc1c3d3cc24b51
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
582ea2217a23c04d04cfe975ea6b1d6a6ed3204391733f4078abe15af8717a18
Commitment
6802d447b3bb6cdb05db4b15dab5e6d0b14e3f8f2e512bfc41c500e70aa9d301
Range Proof
672 bytes (Bulletproof)
Memo
89292e98eb8a1aa9e4482b2f4c3db7ac43641a693df09999b79da93236d91303a3dfa282917a1230c76bfd65584c6d2a8461fb4e500b0ee4420a4b10a14b1142eff8e4c3f8e95aa8e8f37d00b95bab4c831c4583f79b18deb98e441ad01609240498809d6122294318b0db85be3ea16931e567db9f2c55aeca8ffaafc273f679 (encrypted)
Stealth Address
9ed4a22cd5501363d03245c29912df6bab922cc30f05e2d226e730ca720e960b
Commitment
4cfe953bbcad17609e28331a25ab13f1954a127d312af8359287ec48d387272d
Range Proof
672 bytes (Bulletproof)
Memo
c939a34418a6f1eb789a80f89e573eaa3b0e6c733045089dbae14e8fdf53021866131051f5d1a465a24b67553110e2b605487a72a559b205d730211eeeac368553d9a5d24e1538fc2cec67892b767634eed6f33f8c89e824dfea8c414d72b7f26210d1ce31340f143178099c8945b18bb90807b7bd5930b21a3ea9aed1fcea21 (encrypted)