# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7809a401d88201d02f3ca3860d6e609a0d2fb88f83d4e0d3a0afb54fd4dd5f08
Pseudo Output
5ca03a0593ecb528b29e9ab8816d34fa1c4f0c9748790758c4b5992c5f28d901
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9cf5d48930ad799c21f6c68e9cafbfd56289d5404c88fc37573501dfb0640069
Commitment
e658dcae1f08f28a1542fd28a06a2bad57b8b54e21f32dba6c29ff4d7086f915
Range Proof
672 bytes (Bulletproof)
Memo
715d359ba302cea9643a99f4128400c9ba2ebee72c85ac0c820eaf3bde80c916ab58cf8fe6c89b2407af173479edc31afb8680c4fe0e7c82fdd81648edc96786a801ecb6b869f7745e46062bbe2d656c4914d626dae4a89128e7426847881f944b2babd0fe2532aead1b9c6725ae0a8cbdaad1801d313c0ae64fc486474624f2 (encrypted)
Stealth Address
aec4dc4539036a3b18216f9adef3567dac03905eff142e54fc3f011399e10666
Commitment
ec63580a1e8ecd0325f0a4627f2b59d25ef3cbb5b00c98c985ed5fe3de1f6d22
Range Proof
672 bytes (Bulletproof)
Memo
07c4629b406555e5d007ea718f86313191f56fb1fa992e16a35d1e30e46d4ae7b0f0fd67ce8ecdbd8b0d6377c44e7660668e473ed3ece61465ce01f9fb45a792838c22c2e63b8f8107784cec2fba625f4ea586b082ffb53b2da4ebc3648d546a0f0396fc2bc88d04a817b64d5eca0a83736f27970e2829e15cb6c94624081798 (encrypted)