# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6889aa3737198909e32a8c526f4ab40b4a8d50c3ac67cac5f25202ab8402393f
Pseudo Output
e04bc14ab4f1031ee9c7f69f0d22aea4edbef66ec96972cace6f33fd2f290f58
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c40263907d2fa9c1c1a6ffc3ad2b9e3ad4ffe474bb68f068f9c47fb2949aa576
Commitment
6eae3cda1cb83ff8633f7e56a7d748457e2a3052df53248758242c6789c42578
Range Proof
672 bytes (Bulletproof)
Memo
101dda9066e840141d740c2c49d90c308c20231424906a82575cdd42555120cba0b4240f2397f871df0278004902ffc4a53f4337c408f33e7ca0be7da56154e8c5ac4b02b72e93b72c4b5b12699a736086f6443c3912b0b85f83add8b720589efcda603ff2c26892a712aef5be84cfb983a93697de3f520b3953a83324a821d6 (encrypted)
Stealth Address
40c4e9d6f0cc8f396c9f36b9af3cf33189929de9ff520cfb2ab3bee9fe70905b
Commitment
8e8a5306d56ca4da3e73aac15f7978620360b966e55e19ea951582bcd97b452e
Range Proof
672 bytes (Bulletproof)
Memo
95448b22c88ec267631594d09e27776e553e5ff870271ed2027fae495903f651d6aa613c122fc3620eceeacbfe21ee07424c819e47174a8b58a501eddeae623e414e7b8eec1fd72c0d6b27fe39b48f447f4168ebf7073ef9c40a75dceb31a75be48837f38e78cf1a8127e9418f3cb20724c0fe4a0f75be518a821a3b5139e5ea (encrypted)