# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ce1bd5fbfa8eb4a91ed97340d934f2d2c15509bee754b5d6c0bf20e5f6082c5f
Pseudo Output
0242c71517a9e7e0af22fa2cae149ea8c1326bc7bb35c5041eb9830894dddb73
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7c54559f6e018cfacd9806cb009ef35624caeab04efb729f9a6129d36652265d
Commitment
50c06a144edeade6502d977d129c8d582290434f4678aebbded9df6af717c051
Range Proof
672 bytes (Bulletproof)
Memo
f6c54c2715f7cead96e4bc5c316f1cdcc6a80b47a88ca91624192f87dbf39ad635974bfa6187604f8f11f4ef2bdc90913dcf112eb2797c7b0ace8b4689e926ff4c35843a424c29bcd4144c18ba46320d4bdc18ca303c03c1d9e0d3412430d0cdd7076cfdb4e116cc531c4c5d5a966c78abf71fa2fb5b2291313f780680b76740 (encrypted)
Stealth Address
a2396a192fbc18e98fecfb5fd1c9a63c61b085dc4c0f92683ec8c1ab74ff5068
Commitment
149f4e5cfe78fc47ff913034d964a5605b042dd41b8f07cdaf9a52bc113fb475
Range Proof
672 bytes (Bulletproof)
Memo
4ad7f3f3cafa0eac9e9ce4cce3acfc2a45e4c0b9395c9fe277de794c63abe9b7f7c26c3834faa2dd056a5b0a5b02c8cef76e6886d469782eb8f5e8c271238e73af8658c98e27ae77054c645de247021680da6eacdec98fd6b42048d74858a848f93f111e95c2bbf4d54008c53d3239640d4b0fd539a4abda85252e73687a267a (encrypted)