# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
16526a78854fbf1e58de561e93cba8b37093581a38a7061b66e010d8b491367d
Pseudo Output
007486fb616defa2f08e6b5e22283274b5070bdc1d2026514206c45ec6ff482b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
380d9ae2b2dff357c23fa46798b1e3a240e00f340ee9a8033395988129ca3259
Commitment
5cec89618f71a50cc71acab70acac55bd048a151bb5e4b3ef0fe9705859a3309
Range Proof
672 bytes (Bulletproof)
Memo
0c60dc749e04a65880deec6c590629bafcc4f5f4af99cefe8fb8e11bc7acf66c77f9dbb966e389b218b18cc750c6a9cb9b9ebf7aa671148bc3aea3b906bfc2811f06c6e218a02e27d9b55655b88c2d059b679346df050ec2a4692e962177e7f439775e95309d77ff322c7998f8f687324059690d4660faeba58d1846d8630ab7 (encrypted)
Stealth Address
98ea8e119ed124965e1cca97386b82b3a4e9fa68e8443627c8ef2f8b51481776
Commitment
b8e846f4044f5caddf388afb030afeb95eea371ebac7c2e722cdfd2bcc5af241
Range Proof
672 bytes (Bulletproof)
Memo
95b41eb4139b58450a08eee33d66b3c97305ec852e8b6437b2baccc99ee800339408d3f1424f30320d044a450f3ca2dd505323e6139f94366605383d4ea654312d1af7b9f83f32d37c9ac265cdf00c43bb792111e654b4a571b2441999c3fef0ff92c5f44ebfa90241a9542515305557546af9926dd057b7f5b568055bcad7b5 (encrypted)