# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
98e338116f9c083697b62be26c2129fb6654b5e680ab64ff9897734cca7b825f
Pseudo Output
3ebbb22a6a5501a4bc017780554ea2105337ac1e28ff26be91c4bc31efe7fb57
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4cda2f46c8db8eafbf1e8d9361fe7d1a728dc7950b2dc625580dea4e95de3c35
Commitment
bc5a4b5107b2877a7246d37fd0df19013c1341bdf3257de654903837fcd41303
Range Proof
672 bytes (Bulletproof)
Memo
32ac5e51631a249eae16204546ecae0f07587e11e9a0b0402d115e267b875a4d27ba41bff76e2b37ffd10c27ffbe6f04a3e1f79ef0817c8f21efc678acfd117bee5eacab2e9af277bf9462ff379ddbf73880065a1926dbec79f39b8a01c20f1419aac3a7a07f89e214cb0af7e20e34df50405c2fba43a339d0b131d8475679aa (encrypted)
Stealth Address
ec1dca31ecc202d8f074a631b94daeb645553bbbe5574f48df87ee540cbea44e
Commitment
f40a7053580b3ed7524f8644f78cfd14811d5856c6cb45e56271158b47e9082d
Range Proof
672 bytes (Bulletproof)
Memo
e71332766dc3ff97e51890a1043593b9d51e9660ebd4ad5bbadebfe1efc1f2708eb265ea03671e664d0e2adcfaef6d6d5429c31142bb69036a8d5dab34d133387282e0a776ef1510a919790f430b53d57babc1180386e7d92bcea6896a1aaff0c20a04ef6b1495d999e48312f10d83be4027ba9586a086fd12b1eb7682a6458b (encrypted)