# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f022f2788ed9dd08f31baafb72964d80aa7ac35609d8ac995704a5ebfc16072f
Pseudo Output
8c76a6fd6fee3de86ac6fdd7b4b3208f683eefe742061610eb6f324e4d05a033
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1eec21e10f4b7fcbe931f45af869cc4622ef06f3cb4c1c22cc76c0e9ce60de39
Commitment
1ac7c6b11a55a20158bc8b5854f5643a8d3648ee0c823f809c434286b0a5331f
Range Proof
672 bytes (Bulletproof)
Memo
a86ccae2e863e6618693b15810bc2201585904e48904edcb968a237a5090e3e4369a566bb801ba2fa9d1127552c5f8ab9906720d0e58dd041fd7201241ebddbac31ad752882071a59814e8acd48bb7867fd822db4249763aff432e5d50132ea9a1d72c01c966472e3cb51910ce0bb0cf2d9aee95ae5918603e8ac5acee029a27 (encrypted)
Stealth Address
6691399374bec9d4090ef2656740cb8b2439dc190cc5eb059eb08415ae2d0c50
Commitment
403d955261cb72566940e8025ac00af6e120d61dcdcd48d342711df15377f57a
Range Proof
672 bytes (Bulletproof)
Memo
3ae14783c4cd967de23e6c8fa9ce50e9688037fee4aa6997517cb0f9e1fa6a7020cea034c0297a730d5cfb0c0bab389bf78fc9b66f1f7caf76a1ec728342dce8e51913a0b47df32c633a8c6ce20e6084bdd11f0891f2057d0384754e5050d69920801eb9fa09e33ef9dbbc246537c75501976f6db78f04f9ff02fa25b1a73741 (encrypted)