# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72e4f453407b85bb81669f0dc3e2f7494ef6d034ef3aa2e6f18050cb40b7d87a
Pseudo Output
60292c100ea2941c9d7b3fc0fe73f384c5d72f7259e9a08aa019c09e27bd3a61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f0169dadb165d113870616a43831895c3f957174b459d2e15510c68cb82b5024
Commitment
06e5fbb9904995379c4dd30ba201657e3ee7102c2f6eda63fbbc6f4e71184f10
Range Proof
672 bytes (Bulletproof)
Memo
4f2ca64e11e9e481b8b6e3392e1eea97d91240369ca867eed6a27033b2d339a675762f39e5a9a78880c6dd41be5ff0fe107d5b8a62354ef136848b8b87d3331b92f8f89c373ca1d6f3ecdafd234b80058b3027d7fdf682632fc6311325d9f9882afd7de4c3df887478f974724475604e91b3b37f12ba65836e2a2e23f6a7f389 (encrypted)
Stealth Address
00439dceafc7cb94a40c80e11900ff87d46092147f863bd6bc9368c9b2ff8237
Commitment
8622df624de74ec724281c46f85da8f42aef9a6df24598db69ea5019c7be5773
Range Proof
672 bytes (Bulletproof)
Memo
aad3254661e032f84f2e9952a1abab1737d2bc50f7040e5503c3ebb706392dd5191bd34863f6666327d6717fd01e85f5600e7ab0829c0357188c58b0a2b7de9de8e133206835cbf409a75980c6c129becf5df6e38533a4d25a35c337e84117408b5ff1c0fc1c51b55aa32f01373e64b51fad60891d3464066e394db8222222ac (encrypted)