# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
86b34d4490a0aa944d7c258280dffdb805eaf7b4e22625fcb87da4043958cc6c
Pseudo Output
dc6d88a1e940d09a36e6583579a76fb2c2f99edd30a90f5eb75667c7a388e945
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7cd1daeeab4ae21465fde55d79434699c46965d7beb784f2837eb2a53218a659
Commitment
e47bcac1ee117a0da85ebb42f00f3be43917c82e8e90cb85da125f413e2b6c3f
Range Proof
672 bytes (Bulletproof)
Memo
913e04682798791d40c9b72174188c5773133d5dd92f52242892410714098d46bce1a958c1a87ec9ba0540d37094b21a193be2546130db0693cf311e4b56d8fd972f3dcf4989657e449a634498df009ace35c8d22b7c395ee206781844bcdf3e5fa2e6f05e3cff0b5b8b2e18bc3a62b63104b42ea740a46c76afa08c8f02db1f (encrypted)
Stealth Address
aed212d153091ec11ac21dfa9482b7b11971c3c3a9b8ad4df00c847a9c61f147
Commitment
7cf6b57dfa26f1eb5981021ebca62a2ad866e58424bccc854f73c278aa9f3165
Range Proof
672 bytes (Bulletproof)
Memo
e3647dd92e520b70c8164857a66cde634e5efcede8971167fd7d1829f730ad540c908b48ec45ac60cd8104405cc35074bdd7bbfdb96da5b541704dd52cd9f7e6fefe60d41a406efb475343aba707d16d2593984d0b3cc452f4c9b5008741f30d4d639328cd705c56f44bef88461031a46444881e92dcfa82703f71d175636448 (encrypted)